Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Evolution of Honeypots: From Traps to Intelligence Tools | Razorthorn Security

Robert Black discusses the historical and modern uses of honeypots in cybersecurity. Initially designed as traps, these tools now serve as valuable sources of intelligence, helping organizations understand attacker behaviors and enhance defenses. Learn how deception technology has evolved over time.

How GitGuardian Provides Peace of Mind for Kubefirst

In the world of software development, the security of your code is paramount. This is especially true for GitOps shops like Kubefirst, where secrets, tokens, and repositories are constantly being updated and shared. John Dietz, CEO and technical co-founder of Kubefirst, shared his experiences with GitGuardian and how it has become an essential tool in their operations.

NYSE's #TakingStock: Arctic Wolf President & CEO Nick Schneider on the Centralized Platform

At #RSA24, Arctic Wolf CEO and President Nick Schneider sat down for a #TakingStock conversation with Trinity Chavez to share how Arctic Wolf's focus on delivering superior security outcomes has led to enhancements across our industry-leading security operations platform. #EndCyberRisk.

Zero-Trust Application Service: Protect Against Unknown Threats

Are you struggling with unknown threats? Conventional security measures may not catch everything, leaving gaps for harmful applications. Discover how WatchGuard EDR’s Zero-Trust Application Service uses AI-powered threat detection to ensure every application on your system is classified for comprehensive protection. Take a proactive approach to your cybersecurity and keep your systems safe from unknown threats.

AI Integration: Empowering Your Team for the Future | Brivo Insights

Dive into the world of AI with Brivo! In this essential guide, we're exploring how to seamlessly prepare your staff for the AI revolution. With technology rapidly evolving, ensuring your team is ready to embrace AI is crucial for staying ahead. From understanding AI basics to implementing practical training strategies, we cover it all. Plus, discover how Brivo's smart spaces technology can enhance this transition, making it smoother and more efficient.

The Stuxnet Lesson: Trust and Deception in Cybersecurity | Razorthorn Security

Robert Black recounts the famous Stuxnet attack on Iranian nuclear facilities, highlighting the role of deception. By making systems appear normal to attackers, significant damage was done without immediate detection. Understand the power of trust and deception in cybersecurity defense strategies.

Webinar Replay: Q1 2024 Threat Landscape: Insider Threat & Phishing Evolve Under AI Auspices

In the first quarter of 2024 Kroll saw an evolution in techniques used by attackers, some of which may point to longer term trends in the variation and sophistication of attacks faced by organizations. In this briefing, Kroll’s cyber threat intelligence leaders explore key insights and trends from hundreds of cyber incidents handled worldwide in Q1.