Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Embracing Conscious Leadership and Generative AI Transformation with Aysha Khan of Treasure Data

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.

Web Shell Upload Via Extension Blacklist Bypass - Part 1

We delve into an in-depth exploration of a common web security vulnerability related to file uploads and it demonstrates how attackers can exploit weaknesses in file extension blacklists to upload malicious web shells. We also cover the mechanics of bypassing these security measures, including specific techniques and tools used to see practical examples of how to conduct such an attack in a controlled environment, emphasizing the importance of understanding these vulnerabilities for defensive programming.

API and Cybersecurity: Protecting the Wires That Connect the World #API #APISecurity #Cybersecurity

APIs are the foundation of modern connectivity, but with great power comes great risk. In this video, explore: The critical role APIs play in industries like Smart Cities and connected cars. Overlooked client-side vulnerabilities that expose hidden risks. How misconfigurations amplify data breaches at scale. Key cybersecurity measures like rate limiting to prevent exploitability.

[Podcast] ChattinCyber's Unmasking Cyber Threats: The Rise of Spoofing + Phishing with Gideon Hazam

Marc Schein is chattin’ with Memcyco's Gideon Hazam in ChattinCyber's latest episode. The conversation provides valuable insights into the challenges posed by spoofing and phishing attacks, the connection between the two, and the need for robust authentication measures to protect against these threats. The discussion highlights the importance of detecting attacks quickly, identifying at-risk users, and implementing effective protection measures to safeguard organizations and their customers.

The Vendor's Survival Guide to Security Questionnaires | TrustTalks Ep 5 | Security and GRC Podcast

Seeking a solution that streamlines vendor risk management and automates security questionnaires? Imagine a tool that offers a comprehensive portal, securely shares information, uses AI to handle responses, and frees up your evenings. It might sound too good to be true, but with ⁠TrustShare⁠, it’s a reality. Forget the hassle of maintaining a knowledge base or configuring tools meant for RFPs. TrustShare takes care of everything, from AI-driven responses to seamless information sharing, which leads to faster sales cycles.