Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ChatGPT Data Breach Break Down

OpenAi have confirmed they have had a data breach involving a vulnerability inside a open-source dependency Redis. This allowed threat actors to see history from other active users. But this leads to the bigger question, how can we secure ChatGPT. In this video I explain my position using some interesting data that ChatGPT should be part of all organizations threat landscape and that banning ChatGPT won't help the situation.

Webinar: Six Best Practices to Help with Your Regulatory Compliance Program

Companies around the world today need to deal with a wide array of standards and regulations, many of which are specific to their industry vertical or region. But MSPs work with customers in many different verticals and need broad awareness across different industries. This webinar will highlight how there are common threads that will help with compliance with any regulation.

Webinar: How XDR Can Help MSPs Scale and Grow Their Businesses

Cyberattacks are becoming ever more sophisticated, leaving MSPs struggling to stay ahead of the game with their limited tools and fragmented views. Join us in this webinar as we explore XDR – a modern approach that helps strengthen cybersecurity capabilities and offers comprehensive protection for customers. Join us in this webinar, where we'll give you XDR essential concepts and the keys to free up overwhelmed security teams trying to triage and identify attacks with only narrow, disjointed attack viewpoints. We’ll be covering the following.

How to spot a deep fake? #shorts

Andy Thompson, Offensive Security Research Evangelist at CyberArk Labs, returns to Trust Issues for a dive with host David Puner into the latest developments in the world of ransomware. With ransomware events on the rise, Thompson sheds light on the alarming trend of data exfiltration and double extortion. But what’s causing this surge?

End-User Vault for Business & Enterprise

When you provide Keeper to your employees, they have the choice of using the Keeper Web Vault, the“KeeperFill” Browser Extension, Keeper Desktop App for Windows, Mac and Linux and our mobile app for iOS and Android. Vault data is synchronized across all platforms, so your users can access their data in any of these Keeper applications. Users can login to Keeper using biometrics like Face ID, or by entering a Master Password - which is the only password they will have to remember.

LC101: Simplifying enterprise deployment

LimaCharlie is a cybersecurity middleware platform to connect sources of security telemetry, automate activity based on what's being observed, and forward data where you need it. LimaCharlie puts you in complete control of your data, allowing you to build the security program that your organization wants and needs.

Securing Cloud, Containers, and Kubernetes

Sysdig's Cloud Protection and Response platform bridges the gap between the cloud tenant, the Kubernetes workloads that run in that cloud provider, as well as the processes that are actually executed within containers running in Kubernetes. In this video, Sysdig Senior Technical Marketing Manager takes us through the platform and the best practices to secure your environment!