Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Criminal Minds: How the Cyber Crime World Works | Razorwire Podcast

EP08. Criminal Minds: How the Cyber Crime World Works Keywords: criminals, cybercrime, cybersecurity, ransomware, Welcome again to the Razorwire podcast. Sun Tzu wrote that if you know your enemy and yourself then you need not fear the outcome of all your battles. In this episode, we discuss the enemy, how they work, how the larger gangs are set up and the dangers of large, organised cybercrime gangs vs the smaller gangs. We also take a look at how they chose a target and why.

Create Automated Workflows with Pre-Built Falcon Fusion Playbooks

CrowdStrike Falcon Fusion is an extensible framework built on the Falcon Platform that allows the orchestration and automation of complex workflows. These workflows can be used to simplify tasks, accelerate response time, and save valuable time for security teams. Falcon Fusion is included in the Falcon platform and available to all customers. Available in console now are Falcon Fusion playbooks. Playbooks are pre-built workflow templates centered around common use cases.

The 443 Episode 214 - Ransomware TTPs Deep Dive

This week on the podcast, we cover another remote code execution vulnerability that looks extremely concerning on the surface but might be less serious in reality. After that, we cover two research articles by Microsoft on ransomware campaigns including defensive takeaways for all organizations The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Improve Response in the Threat Detection Response Equation - Webinar

Operationalizing data at the same scale it’s collected is vital, yet 55% of organizations surveyed by analyst firm ESG said they don’t have the skills or the time to create automations or playbooks to manage all threat data at machine speed. @Enterprise Strategy Group ESG and @Torq will explore the landscape of EDR and XDR systems and show how teams can approach the challenges of operationalizing the threat data they provide with different approaches to automation.

[Webinar] GitGuardian and TechStrong Present Tackling Secrets at the Enterprise Level

As DevOps turns to multi-cloud, workload containerization, and infrastructure-as-code, securing and distributing secrets across teams and environments has become a complex undertaking. Left unmanaged, this leads to secrets sprawl; in other words, the exposure of credentials in source control servers, DevOps tools, and every component that makes up the software development life cycle (SDLC). With exposed secrets, attackers can easily access an organization’s critical resources. They can breach the perimeter to carry out attacks, hijack computing power, exfiltrate customer data and compromise the integrity of the software supply chain.