Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cybersecurity Sessions S02E03: Bots vs consumers, social media APIs, ticket scalping legislation

In this month’s episode, we start by focusing on the real-world impact of bots (scripts used to automate tasks and exploit business logic). In the UK, bots are being used to book up every available driving test before reselling them for profit; meanwhile in the US, gig workers delivering groceries are losing out to bots that hoard the most profitable delivery jobs. Our panel explains how this happens and discusses what can be done to stop it.

Under the Wing: The Risks of Microsoft Security

Cyber risk starts with your choice of security provider. Your security investment is one of the most CRITICAL business decisions you can make. You may have heard that Microsoft offers endpoint security as a built-in feature of their products. But if your security is “free” - you’re getting what you pay for. In our latest episode of Under the Wing, join Mark as he dives deeper into some of the risks of using Microsoft security products and 5 reasons why CrowdStrike customers never have to compromise on security.

Reality of Cyber Warfare: Twitter Echo Chambers

Join us as we explore a fascinating study conducted in the early 2010s, revealing the existence of echo chambers on Twitter. Delving into the world of social media dynamics, this study highlighted a stark divide between pro-Democrat and pro-Republican individuals, with limited connections bridging these two ideological bubbles. Fast forward to the present day, and the influence of echo chambers in our current social media ecosystem has only amplified. In this eye-opening video, we examine the implications of this polarization and its impact on public discourse.

Understanding API Attacks

As APIs have become the backbone of modern applications, threat actors are increasingly targeting them. Whether it be to exfiltrate data, take control of critical systems, or disrupt key business services or digital supply chains, threat actors have taken notice—and they see APIs as a prosperous attack vector. In this video, you’ll gain valuable insights into API security and learn proactive measures to safeguard your APIs. By understanding the challenges posed by API attacks, you’ll understand the best strategies to protect your organization.