Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Friday Flows Episode 26: Use AI to Summarize CISA Alerts

In this Friday Flows, Kevin Davis walks through a new story incorporating CISA’s catalog of known exploited vulnerabilities, filters them to identify the most critical ones, and then prioritizes and offers a concise summary for each vulnerability… using our new AI features! There are two main ways Tines has incorporated AI into workflow building: 1) "Automatic Mode" in our Event Transform action and 2) a new AI action.

Memcyco Presents: The State of Digital Impersonation Fraud Resilience

Ever had those sleepless nights, tossing and turning, worrying about your next health checkup? Well, in the cyber world, it’s your brand that’s losing sleep! We recently talked to 200 top-notch security and fraud professionals—think of them as the cardiologists of the cybersecurity world. They spilled the beans on how digital impersonation attacks mess with their brand’s health.

The Hidden Dangers of Unapproved Tech: A Cautionary Tale

In today's digital age, the allure of cutting-edge technology is undeniable. However, the rush to adopt the latest gadgets can sometimes lead us into murky waters, especially when these devices lack official approval. In this eye-opening video, we delve into a real-world scenario where internet-connected watches, without proper authorization, communicated with unauthorized external servers.

UpGuard Summit May 2024 (North America)

In this quarter's UpGuard Summit, we’re continuing our focus on scaling your Third-Party Risk Management (TPRM) program. Hear how you can eliminate manual work, harness automation and keep up to date with emerging threats. You’ll also learn how security leaders have evolved their TPRM function and the lessons they’ve learnt along the way. Interested in finding out more about UpGuard?

The 443 Podcast - Episode 292 - SSID Confusion Attacks

This week on the podcast, we cover a newly disclosed weakness in the 802.11 Wi-Fi standard that affects common enterprise Wi-Fi deployments. Before that, we discuss CISA's Secure by Design Pledge for technology vendors before ending with a Microsoft research post on Quick Assist social engineering. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Sysdig's AI Workload Security

AI usage has exploded. In just a few years, it's gone from something the enterprise should track to a powerful technology set we rely on. This sharp rise has created a world of opportunity and a new set of security challenges that we need to be aware of, but not scared of. And that's why I'm excited to share our new AI workload security feature. By understanding where they are running, Sysdig helps you control shadow AI and active AI risk and keeps you ahead of emerging AI regulations because you'll know what AI workloads you have, where they are, and what risks are associated with them.

Trust and Control in Third-Party Audits: Navigating the Challenges

This clip explores the delicate balance between trust and control in managing third-party vendors. With only large corporations often able to conduct thorough audits, many organisations must rely on paper audits and trust the provided responses. Understand the limitations and strategies for ensuring security when physical audits aren't feasible.