Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

How to Build a Culture of Urgency

Darwin said it's not the strongest or the smartest that survive and thrive, but the quickest to adapt to change. Speed is everything if you want to run a company successfully. To do that, you need to build a culture of operating with urgency. That doesn’t mean you run frazzled or do a million things simultaneously. Nor does it mean being too flexible and nice when dependent teams tell you, “Go wait.”

How to Connect to Microsoft SQL Server Remotely Using Teleport

In this video, we'll look at how to connect Teleport to Microsoft SQL Server with Active Directory authentication. We'll also be exploring Teleport's RBAC system, Audit logs, as well as how to connect a GUI like Azure Data Studio, SSMS, or Datagrip to our database via Teleport. Some of the mentioned resources may already be set up or active in your environment. If so, feel free to utilize the timestamps below to maximize your situation.

Sysdig CSPM remediates security issues in seconds

Automate security issue fixes in seconds and reduce cloud risk with Sysdig. Let's dig in! We know cloud teams have tons of security issues. You can be spending hours trying to understand if those findings pose a real risk in your cloud environment. So, how can you shorten the time needed to triage every misconfiguration and take action on those that really matter to you? Discover how Sysdig aggregates security findings by root cause and prioritizes remediation based on impact and risk.

Stranger Danger: Your JavaScript Attack Surface Just Got Bigger

Building JavaScript applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome - you're a cloud native application developer! As developers, our responsibility has broadened, and more software means more software security concerns for us to address.

Lorenz Ransomware Intrusion: Understanding Your Risk

The Arctic Wolf Labs team recently investigated a Lorenz ransomware intrusion, which leveraged a Mitel MiVoice VOIP appliance vulnerability (CVE-2022-29499) for initial access and Microsoft’s BitLocker Drive Encryption for data encryption. Lorenz is a ransomware group that has been active since at least February 2021 and like many ransomware groups, performs double-extortion by exfiltrating data before encrypting systems. Over the last quarter, the group has primarily targeted small and medium businesses (SMBs) located in the United States, with outliers in China and Mexico.