Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing Your Cloud Infrastructure with Azure & Tines

In the third instalment of "Tines, securing your cloud infrastructure" we look at two stories designed to save money and resources and close potential security gaps in your Azure environment. Firstly, we'll address the task of 'Updating groups assigned to a user in Azure Active Directory' which allows admins to update a user's group membership in Azure Active Directory. This is essential for adding extra security to accounts flagged for suspicious activity and protecting the team & company as a whole.

Applying Vulnerability Intelligence to CVSS and SSVC Frameworks

In this presentation, we explore the intersection of vulnerability intelligence and prioritization frameworks such as CVSS and SSVC as a means for strategically and rapidly prioritizing vulnerabilities to stay ahead of exploitation risks. We delve into the process of applying real-time threat intelligence tailored to the vulnerability landscape to enhance decision-making, optimize resource allocation, and ensure a precise and proactive defense against cyber threats.

Striking the Right Balance: Compliance vs. Real Cyber Risks | Navigating Organizational Priorities

In our latest exploration of cybersecurity challenges, we delve into the delicate balance organizations must strike between compliance efforts and the real cyber risks they face from the outside world. It's a common pitfall for organizations to develop a higher tolerance for compliance risks, often channeling significant resources and funds into demonstrating adherence rather than actively managing and mitigating specific threats.

Random but Memorable - Episode 12.1: Data Breach Box Set with Jayson E Street

We're back! Join the podcast crew for a brand new season of random security. We're kicking off our first episode with notorious hacker and expert security consultant, Jayson E. Street. Settle in, as he recalls how understanding human behavior led him to successfully robbing banks and organizations on five different continents.

What are secrets? Why hardcoded secrets are a security risk. Explained in 60 seconds

Secrets like API keys, Certificates, and credential pairs are used throughout modern software development. However, these pose a significant risk as attackers are always after them to gain unauthorized access to our system. This video explains in 60 seconds why hardcoding secrets or insecurely storing them is a security issue. The video also addresses some tools to use to manage your secrets or to scan your sourcecode for secrets,

#101 - WiFi attacks and defense with Lennart Koopmann, Founder of the Nzyme Network Defense System

In this episode of The Cybersecurity Defenders Podcast, we take a close look at WiFi attack methods, and the defenses to them, with Lennart Koopmann, Founder of the Nzyme Network Defense System. Lennart Koopman, a tech enthusiast originally from Germany, now calling Houston, TX home. He began coding at a young age and chose to forgo formal education, diving straight into the world of computers after high school.

The Howler - Episode 6: Mark Manglicmot, Senior Vice President, Security Services

In this episode, our hosts sit down with Mark Manglicmot, Senior Vice President of Security Services at Arctic Wolf, who brings his fun, energetic personality to the podcast while sweating it out over hot sauce! Interested in running with the pack? Explore careers at Arctic Wolf — one of the fastest-growing and exciting cybersecurity companies in the world, to learn about how you can join our Pack, create impact, and influence what’s next in security operations.