Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

See it in action: Privacy-first generative AI with Elastic

Get a look at the power of Elasticsearch and generative AI (GAI) in action — always putting privacy first and safeguarding your proprietary data. Several examples show off the art of the possible, with intuitive, personalized results you can’t achieve with just publicly available data.

Decoding Cyber Warfare: Unveiling the Covert Battle for Control

Prepare to enter the shadowy world of cyber warfare, where governments across the globe engage in a hidden struggle for dominance. In this captivating video, we delve deep into the intricacies of this clandestine battleground, exposing its low-frequency maneuvers and revealing how it affects us all. Join us as we explore the enigmatic realm of cyber espionage and its impact on the modern world. Discover why cyber warfare intertwines with traditional conflicts, acting as a vanguard of chaos and a weapon to disable strategic targets.

Privileged Access Management (PAM) with Netwrix Solutions

Minimize your attack surface by eliminating the need for standing privilege altogether. Reduce the risk of business disruptions or compliance failures by managing and tracking all privileged activity in one place. Every day, organizations face the threat of cyberattacks that target privileged accounts. In fact, a staggering 74% of data breaches start with compromised privileged accounts and credentials. Is your organization prepared to defend against these attacks?

Coffee Talk with SURGe: 2023-JULY-11 Meta's Threads, US/EU Data Sharing, MOVEit Update, iOS Patch

Grab a cup of coffee and join Mick Baccio, Ryan Kovar and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Mick and Ryan competed in a 60 second charity challenge benefitting the Malala Fund to share their suggestions for this year's defense policy bill.

LockBit hits TSMC: A $70M Ransom?

TSMC, the world’s largest semiconductor manufacturer, has been listed on LockBit’s dark web blog, with the gang demanding $70 million for the stolen data. TSMC states that it was due to their IT hardware suppliers; yet another reason to pay attention to the supply chain. So, who are LockBit, how do they operate, and how can you prevent this from happening to you? Learn all this and more on the latest episode of The Ring of Defense!