Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SQL Server hardening

To safeguard the SQL layer against common SQL-based attacks, including Denial of Service, Brute Force, and SQL injections, and to prevent privilege escalations, hardening the SQL server is of utmost importance. Achieving compliance and satisfying auditors also necessitates SQL hardening. By implementing SQL hardening measures at both the application and operating system levels, the organization can significantly reduce its attack surface and eliminate critical vulnerabilities.

What is Digital Forensics Incident Response? | Security Expert Reacts to DFIR

Digital Forensics and Incident Response? (DFIR) is the cybersecurity field that defines the process and the best practices to follow in order to deal with a cyber attack or a security breach. Join Miguel, a security expert watching a video about a cyber detective investigating a kubernetes breach, and find out what the culprit was!

The Evolution of the Internet: From a Fad to a Global Phenomenon

Do you remember a time before the internet? It's hard to imagine our lives without it now, but there was a time when people believed it was just a passing fad. In this video, we take a look back at the evolution of the internet and how it went from being a niche technology to a global phenomenon that has changed the way we live, work, and communicate. We explore the early days of the internet when people thought it was just a passing trend, and how it evolved into the complex and ever-evolving system we know today.

Coffee Talk with SURGe: Oakland Ransomware Attack, BreachForums, Acropalypse Vulnerability, GPT-4

Grab a cup of coffee and join Ryan Kovar, Mick Baccio, and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Mick and Ryan shared their takes on responding to 0day vulnerabilities and the trio also discussed GPT-4 and the future of generative AI.

Keeper 101: Time Limited Access with Keeper + Indent

Indent is an elegant partner solution that enables Keeper enterprise users to easily request time-limited or permanent access to cloud applications and infrastructure, including Keeper enterprise teams. Access is granted when users request membership to Azure or Okta groups that correspond to a Keeper team through an Indent form. Here’s how it works. When someone needs access to a record, from the Indent console or through a Slack integration, the user will request access to the desired group, specify a reason they need access, and request either permanent access or an access duration.

Overview of Teleport 12: Device Trust and Desktop Access

Join us as we showcase the latest features of Teleport, the first identity-native infrastructure access platform for engineers and machines. Teleport delivers phishing-proof zero trust for every engineer and service connected to your global infrastructure by replacing insecure secrets with true identity.

The Masterclass Series - A Tutorial in Breaking Barriers and Building Strategies

Part 1 – Attitudes toward the security community In part one of the webinar, we'll explore some of the challenges and obstacles that professionals may encounter within the information security field, including those that originate from both within and outside of the security community. By understanding these hurdles, attendees will be better equipped to navigate the complex landscape of information security and develop effective strategies for success.