Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Operationalizing TLSH for Detection with David Burkett

David Burkett, Cloud Security Researcher at Corelight, joined Defender Fridays to discuss operationalizing TLSH for detection which enables fast, scalable, and resilient identification of near-duplicate files, helping to uncover malware variants and similar threats with minimal false positives.

Modern Tech Old Systems on the Cloud! #shorts #datasecuritydecoded #cybersecurity #podcast

"If you don’t know what you have, you can’t secure it. And putting a 30-year-old system on the cloud doesn’t make it modern.” – Kris Lovejoy Cybersecurity starts with the basics: inventory and upgrades. Want to future-proof your business? Catch Kris’s insights on now.