Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

£20 Million Cyber Insurance or £5 Million Cybersecurity?

We delve into the complex world of cyber insurance and the staggering premiums associated with securing a £20 million policy for just one year. Join us as we discuss the astronomical costs and the limitations of cyber insurance in the face of growing cyber threats. Is it more practical to invest in comprehensive cybersecurity measures?

Random but Memorable - Episode 11.6: Private Electronic Graffiti Tags with Graham Cluley

How has the cybersecurity landscape changed since the days of the floppy-disc? 💾 This week, we sit down with Smashing Security's Graham Cluley, to reflect on how threats have evolved. Graham also dishes his top security tips and explains why celebrating infamous hackers angers him. 🤬 Tune in for our favorite ways to use tags with 1Password in Did You Know? Plus, Roo hosts HackerNoHacker for a Matt vs Sara showdown. 🥊💥

The 443 Podcast - Episode 264 - Microsoft is Killing NTLM

This week on the podcast, we cover the recent HTTP/2 protocol vulnerability that lead to the largest DDoS attack ever recorded by CloudFlare. After that, we discuss Microsoft's announcement about the deprecation of VBScript and the impending removal of NTLM. We then cover a collection of data allegedly stolen from the genealogy website 23 and Me before ending with a fun bit of research targeting private servers for the Grand Theft Auto Online video game.

GitGuardian Can Update Pull RequestsWith GitHub Check Runs

Did you know that GitGuardian can add comments directly to your GitHub pull requests and even stop a PR from succeeding if it contains any hardcoded secrets? When a new pull request is created, a new check run is performed, and GitGuardian will scan through each commit inside the PR, not just the most recent one. If someone added a secret to an early commit, but then removed it right before making the PR, you still need to know it is present in the git history so you can address it.

Cyber Insurance Policy: How Many Is Enough?

In the world of cyber insurance, organizations face the challenge of securing sufficient coverage for their digital assets. With cyber threats on the rise, relying solely on a single insurance policy often falls short of what's needed. As a result, organizations find themselves reinsurance and stacking policies to bolster their protection. This video explores the intricate process of navigating the cyber insurance landscape, where companies seek to cover potential losses by obtaining multiple policies and strategically distributing risk among insurers.