Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Supply-Chain Attacks: Exploits and Statistics

Growing digital connectivity has led to the rise of digital supply-chain attacks. This session will explain, demonstrate, and provide statistics about the complexity of the problem and about attacks that arose due to dependencies on external infrastructures. While there is no simple solution to the problem, we will present a strategy to reduce exposure and create processes to avoid such vulnerabilities.

Navigating Cybersecurity Challenges: Budget Constraints, Team Dynamics, and Decision-Making Dilemmas

cybersecurity professionals face when faced by cybersecurity professionals when it comes to addressing vulnerabilities. Often constrained by limited budgets and resources, the decision-making process regarding specific vulnerabilities lies in the hands of various stakeholders within the business.

Beyond PCI! Decoding the Essentials of Compliance Standards | ISO 27k and More | Razorthorn Security

Dive deep into the intricate world of compliance standards with our latest video, where we dissect the common misconception that a single standard, such as ISO 27k, is the be-all and end-all. In this eye-opening exploration, we debunk the myth that meeting PCI compliance requirements is the finish line. Discover why these standards are merely the foundation, not the complete story. Many find themselves entangled, thinking, "If I'm PCI Compliant, I'm done." Hold on – that's just the beginning!

The 443 Podcast - Episode 269 - What to Expect from NIS2

This week on the podcast, we dive in to the EU's Network and Information Security directive update, aka NIS2. We'll cover who might be impacted and what to expect in terms of requirements in the coming year. Before that, we give an update to on the latest Scattered Spider threat actor activity followed by an update on LockBit's latest ransomware victims. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.