Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Introducing SwyftComply - Get Clean, Zero-Vulnerability Report in 72 Hours

SOC 2, ISO270001, PCI, and other regional laws require you to have a clean, zero-vulnerability report. That said, even critical vulnerabilities take 250+ days to patch, especially when these exist in third-party plug-ins, open-source libraries, or legacy code. Compounding the problem are zero-day vulnerabilities like the MOVEit SQLi, Zimbra XSS, and 300+ such vulnerabilities that get discovered each month.

Rapid Bulk SCM onboarding made easy with Polaris | Synopsys

It is a constant challenge for modern app and DevOps team to onboard and scale AppSec test in today's highly complex and distributed software environment. Ability to automate bulk upload and scanning of an organizations' hundreds of repositories is the first step. This video shows how the Polaris integrated application security testing SaaS platform helps: To learn more, visit synopsys.com/polaris.

Cybersecurity in 2024: Expert Predictions You Need to Know || Razorthorn Security

Welcome to Razorwire, the podcast for all things cybersecurity and information security. I'm your host, Jim, and today we have a thought-provoking discussion with industry experts Iain Pye and Chris Dawson about emerging cybersecurity threats and trends to watch out for in 2024. In this episode, we dive into three key talking points that are essential for cybersecurity professionals to listen in on.

#95 - The SaaS Cyber Kill Chain with Luke Jennings, VP Research & Development at Push Security

On this episode of The Cybersecurity Defenders Podcast, we have a conversation about the SaaS Cyber Kill Chain with Luke Jennings, VP of Research & Development at Push Security. In this interview, we explore the evolution of cyber attacks and the impact of the remote working and SaaS revolution on the cyber kill chain.

Store API keys and other secrets securely in python using env variables

In this Tech Tip Tuesday video we share how to securely store secrets like API keys or other credentials environment variables. To do this we use the python dotenv project to store secrets in a.env file and load them into local memory. Subscribe for more tech tips, on Tuesdays and other days.

Cyber Essentials or Cyber Essentials Plus? Which do you need? | Product Explainer

Cyber Essentials is worth getting. You probably know this already, but what about Cyber Essentials Plus? Which one do you need, which one should you get, which one's better? If these are questions you have, then boy do we have the video for you.