Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Unlocking Security: MFA vs. Passwords | Navigating Compliance Challenges || Razorthorn Security

Ditching passwords for a more secure future with Multi-Factor Authentication (MFA)! Explore the realm of technical feasibility and compliance requirements. Discover why it's crucial to go beyond the words and address the true intent of security measures. Join the conversation as we delve into the legal intricacies hashed out in court. Don't miss this insightful discussion on revolutionizing your approach to online security!

Snyk & ServiceNow

Did you know that up to 90 percent of modern software uses open source software? Often SecOps, AppSec and IT teams don’t have a complete view of their application security risk across the organization. The Snyk and ServiceNow integration efficiently finds, prioritizes, and tracks vulnerabilities in open source dependencies to get a complete view of your application security posture and drive smarter, faster fixes in ServiceNow workflows.

A Door in Apple's Walled Garden - The 443 Podcast

This week on #the443podcast, Corey Nachreiner and Marc Laliberte covered Apple’s recent announcement describing how they will comply with the European Union’s new Digital Markets Act and what that means for the iPhone walled garden. Before that, they covered a data breach at Mercedes Benz thanks to an alternative authentication method. Additionally, we cover the roundup of vulnerabilities in Ivanti’s remote Policy Secure and Connect Secure products and how organizations should respond.

Installing and Connecting to the Rubrik Security Cloud PowerShell SDK

The Rubrik Security Cloud PowerShell module enables organizations to automate and orchestrate various tasks within the RSC platform using a simple, easy-to-understand scripting language. During this video, you will learn how to install and configure the Rubrik Security Cloud PowerShell module, along with the various ways to connect to your RSC platform. Helpful Links.

Modernizing Access to Mitigate Security Risk and Speed Threat Response

Organizations face increasing risk of data breach, with threat actors taking aim at credentials and standing privileges. So what can companies do to protect their infrastructure? Join Melinda Marks, Practice Director of Enterprise Strategy Group (ESG), Ev Kontsevoy (CEO), and Sasha Klizhentas (CTO) of Teleport to explore.

Cryptographic failures | OWASP TOP 10

In this video, we'll delve into the world of cryptography and explore the ever-evolving landscape of cryptographic failures. We'll start by examining the shift in the OWASP Top 10 from "Sensitive Data Exposure" (A03:2017) to "Cryptographic Failures" (A02:2021), highlighting the growing importance of proper cryptographic implementation in securing sensitive data.