Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to setup the OTP Verification plugin with WS Contact form?

OTP Verification Plugin validates users' email addresses or mobile numbers by sending a unique verification code (OTP) before form submission. By confirming the authenticity and accessibility of the provided contact details, this plugin effectively prevents fake leads. In this video, we'll walk you through the step-by-step process of using the miniOrange OTP Verification plugin with the WS Contact form. Get verified lead generation in WS Form using the OTP Verification plugin, ensuring verified user submissions.

EP 5 - Identity Debt: The Hidden Risk in SaaS Applications

In this episode of the Security Matters podcast, host David Puner sits down with Lior Yaari, CEO and co-founder of Grip Security, for a discussion that covers the concept of identity debt and its implications for modern cybersecurity. Lior shares insights from his experience in Israel's elite Unit 8200 and explains why identity is now the new security perimeter. They delve into the challenges organizations face in managing SaaS applications, the impact of generative AI on cybersecurity and the importance of proactive identity governance.

AI-powered attacks are getting more sophisticated.

AI-powered attacks are getting more sophisticated. However, AI-powered defense is evolving even faster. At Cloudflare, AI is already detecting and stopping threats faster than human researchers ever could. How? Machine learning models analyze millions of attack patterns in real-time, identifying anomalies and blocking threats before they spread. AI detects novel attack patterns before they even make headlines AI reduces false positives, helping security teams focus on real risks AI learns from past incidents, adapting faster than traditional security tools.

Random but Memorable - Episode 14.6: Security Agents Protecting Adolescence with Chris McCarty

This episode we meet Chris McCarty, the inspirational student and founder of Quit Clicking Kids, an organization advocating for children's rights in the digital age. Learn about the rise of “sharenting” and how Chris is fighting for legislative changes to safeguard minors from exploitation on social media platforms. We cover everything from the permanence of online content to getting Gen Z proactive about their privacy.

Access Requests, Approvals & Provisioning - All in Jira | Workflow for Jira by miniOrange

Streamline Access Requests & Provisioning with Workflow for Jira by miniOrange | Product Demo Tired of messy spreadsheets, email approvals, and manual provisioning? Say hello to Workflow for Jira by miniOrange — your all-in-one solution to automate Application Access & Governance directly within Jira Service Management.

Data Weaponization: How Cyber Attacks Impact the Vulnerable

Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. In this episode, our host Caleb Tolin speaks with Pavlina Pavlova, a researcher and cybersecurity advocate focusing on data weaponization and its disproportionate impact on vulnerable populations. Pavlina defines data weaponization as using data to manipulate, deceive, coerce, or attack someone to inflict harm. Her research investigates why cyber attacks and their impacts often have gendered dimensions, with certain populations experiencing more severe consequences.