Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 Things Holding Back Your Vulnerability Management Program and How to Overcome Them Step by Step

Welcome to our latest vulnerability management webinar, hosted by Scott Kuffer and Gene Bandy. In this session, Scott and Gene dive deep into the complexities and challenges faced by organizations in managing vulnerabilities and what you can do about it. Key Topics Covered: Why Watch This Webinar? Don't forget to like, comment, and subscribe for more in-depth webinars and expert discussions on cybersecurity and vulnerability management!

The Art of Cyber Deception: How To Get Inside The Mind of A Hacker with Rob Black

**Explore Revolutionary Cybersecurity Tactics on Razorwire with Rob Black** Tune in to this week’s episode of Razorwire where host Jim engages with Rob Black, a former military strategist turned cybersecurity innovator. Rob’s extensive experience, from computer game design to defusing IEDs, provides a unique perspective through which we can understand adversary psychology in cybersecurity. For more information or to ask questions, email podcast@razorthorn.com. Visit for personalised cybersecurity consultation.

How Lookout Protects Against the Modern Day Kill Chain

Cybercriminals continue to evolve their tactics to compromise your organization's security defenses. The modern approach starts by targeting users on their mobile devices to steal legitimate credentials. Learn how these cybercriminals have evolved their tactics, and how Lookout prevents and protects at each stage of the kill chain.

Ticker News: Major 2024 Cybersecurity Concerns With Loris Degioanni, Sysdig

Loris Degioanni, CTO and Founder of Sysdig, stopped by the Ticker News studio to discuss the major cybersecurity concerns of 2024. In the cloud, attacks are fast. Companies have 5 seconds to discover an attack, 5 minutes to investigate, and 5 minutes to respond. How can companies secure their environment when keeping pace with the speed of the cloud?

Account Takeover, SQL Injection and DDoS Attack Simulation on APIs

Overview: According to TechTarget, 94% of organizations experience security problems in production APIs, and one in five suffers a data breach. The primary reason is that most tech leaders assume that having a strong authentication and authorisation framework is enough to secure APIs. As a result, cyberattacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise. Join Karthik Krishnamoorthy, CTO and Vivekanand Gopalan Gopalan, VP of Products at Indusface, in this webinar as they demonstrate how APIs can be hacked.