Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Where a CISO Should Sit Within an Organisation - Razorwire Podcast

Welcome to Razor Wire Podcast! In this episode, we’re joined by Claire Davies of Arriva and Keith Christie-Smith of Claroty to discuss where a CISO fits best within an organisation, a bit of the history behind it, where trends have been in recent years, and where we think it’ll going to be in future. The role of CISO has traditionally been a part of IT and they often report to the CIO. This trend has been steadily changing over recent years, but the question remains: where should the CISO sit within an organisation? With security events increasing in cost and complexity, is it time that the CISO should sit on the board? Claire, Keith and cyber security consultancy MD James Rees - your host - share their opinions on the subject from the perspective of a CISO currently in the role and with insights from an Accounts Director who deals with CISOs from multiple companies across a wide range of different sectors. The format of our show is a group of us sitting here talking like we are down the pub talking about what we do for a living. So I am inviting you to join us in this episode to learn about CISO. Listen to this episode on your favourite podcasting platform.

How We Save You From Endless Security Questions

Stop using questionnaires to assess the risk of your business partners. Here's why: Suppose you want to hire a marketing firm to help grow your company. To assess the risk, you send them a 20-page questionnaire asking about 2-factor authentication, data encryption, etc. Even if they have a 2-factor authentication in place, e.g., you still have to ask for their company policy to verify. Not only does that result in mountains of paperwork.

How to Identify Timestomping using KAPE

Timestomping is a common anti-forensic tactic that threat actors use in order to hide their tools on a victim’s file system. Detecting and analyzing timestomping can be time-consuming for examiners, but with a combination of the Kroll Artifact Parser and Extractor (KAPE), MFTECmd and Timeline Explorer, the process is expedited, allowing examiners to focus on data instead of worrying about parsing files.

SecDevOps & LimaCharlie: Automating and auditing of Github access.

LimaCharlie's Security Infrastructure as a Service (SIaaS) approach makes it ideal for securing your CI/CD pipeline and building security solutions that make sense for you. In this video LimaCharlie founder and CEO, Maxime Lamothe-Brassard, walks through various ways to visibility and add layers of protection to your development process.

Keeper One-Time Share for Android

Keeper "One-Time Share" provides time-limited, secure sharing with anyone, even if they don’t have a Keeper account. One-Time Share is the most secure way to send confidential information to a friend, family member or co-worker without exposing sensitive information in plain text over email, text message or messaging. To share a record using One-Time Share on an Android device, select the record and tap Share. From the options, select One-Time Share. Next, tap the One-Time Share icon in the lower right corner of your screen and select your preferred record access expiration.

Remote Users - Protection from Internet-Based Threats

When working remotely, users are susceptible to Internet-based threats like phishing and malware. With the Lookout Security Service Edge (SSE) platform, organizations can prevent the loss of personal information and the installation of malware by assessing each link a user tries to access, regardless of what doc or app contains the link.

Remote Users - Protect Data within Managed Apps

Organizations need to maintain security controls on corporate data regardless of where the users work location. When uploading content to a cloud storage provider, the Lookout SSE platform can help direct users to use corporate providers instead of personal. And when data is downloaded locally, the Lookout platform can protect the data outside of the managed app through encryption.