Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

How to Protect Your Cloud Assets from Being Cryptojacked

Cryptojacking attacks have become the most prevalent type of attack on cloud native infrastructures. For example, in 2022, there were 139M cryptojacking attacks, but the following year there were over 1 billion! That translates to nearly 3M cryptojacking attacks every day, on average in 2023.

How to Protect Your Business From API Data Leaks

Application Programming Interfaces (APIs) are rapidly becoming the primary attack vector for cloud native applications. In fact, according to one study, 92% of organizations have already experienced a security incident resulting from insecure APIs. This is because loosely coupled microservices predominantly intercommunicate via APIs. In this video, we will analyze a ‘ripped from the headlines’ case-study example of data leakage via insecure APIs. Then we will examine various API vulnerabilities that can be exploited by attackers to enable data leaks, including Broken User Authentication (BUA), Broken Object Level Authentication (BOLA), and Broken Function-Level Authentication (BFLA).

Cloud Unfiltered with Sathish Balakrishnan - Exploring the Future of AI and Automation - Episode 12

Join host Michael Chenetz on this enlightening episode of Cloud Unfiltered as we dive deep into the realms of AI and automation with special guest Sathish Balakrishnan from Red Hat. Sathish, who leads the Ansible Automation Platform business, shares his valuable insights on how AI is enhancing automation technologies and the critical role of automation in leveraging AI effectively across industries.

Outshift by Cisco | An Era of GenAI & Human Collaboration

AI is the key to unlocking the untapped potential within your organization. At Outshift, we invest in the future of GenAI, not as a tool that replaces human effort but as a transformative force that amplifies the creativity and ingenuity of people across your enterprise. We invite you to reimagine the role of GenAI in business. Thinking of it as a tool for connection, adaptation, and creativity - a tool with unprecedented efficiency and impact.

Generative AI & Security - Cisco Research Summit Spotlights the Latest in GenAI

Cisco Research hosted a virtual summit to explore current research in the generative AI and cybersecurity space. The session includes presentations from University professors collaborating with the Cisco Research team, including Srini Devadas (MIT), Vijayalakshmi Atluri (Rutgers), Jie Ding (Minnesota), and Ravi Sandhu and Ram Krishnan (UT San Antonio). Listen in for unique and exciting perspectives on the possibilities of generative AI in security, including discussions on the trustworthiness of LLMs, training and maintenance of AI models, and more.

Cloud Unfiltered with Marc Prioleau - Complexity of Collaborative Mapping - Episode 10

Marc Prioleau of the Overture Maps Foundation discussed the solution and the how and why of how it came to be. Mapping is critical in so many areas and we take for granted how dynamic we expect it to be. This cloud based, open source solution answers the question on how companies can share and contribute to mapping data.

Breaking the Cloud to Build the Cloud

There’s no such thing as a perfectly secure cloud environment. Vulnerabilities, holes left open by misconfigurations, over-permissive roles, and more create a target-rich environment for attackers. Breaking the cloud for good is the job of these expert hackers. View this panel session to learn about offensive security techniques and tactics for breaking the cloud to build the cloud better.

Managing Cybersecurity Risk from the CI/CD Pipeline to the Board Room

In this panel conversation with leaders in cybersecurity, get advice and insights into navigating between IT and Security teams with the advancement of “shift left” concepts as security increasingly moves to development teams and DevOps grows in importance. Further, hear tips and advice on educating Board Audit Committees and Executive Leaders on cloud trends and risk focus areas to maximize investment and focus on the risks that matter to the business.