Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Importance of Isolated Backups for Cybersecurity

In this video, we discuss the critical role of isolated backups in protecting your organization from cyber threats such as DDOS attacks and ransomware. We explain how disk backups are done on a daily, weekly, or monthly basis and can be stored in a safe and controlled environment, ensuring that critical data can be restored in the event of a breach. By keeping backups isolated from your network infrastructure, you can prevent cybercriminals from accessing them and ensure that your organization can recover quickly and effectively.

Random but Memorable - Episode 10.3: Ransomware Hunting Team Emergency

On today's show we shine a spotlight on an incredible real-life technological thriller, as we invite Renee Dudley and Dan Golden to discuss their new book: The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime.

10 API Security Tips you must know

Cloud services have made the world a highly interconnected ecosystem. Enterprises leverage services (virtual and physical) provided by other enterprises rather than build them from scratch, creating a web of connected devices, applications, and users. An API is one such service. About Indusface: Indusface is a SaaS company that secures critical Web applications of 5000+ global customers using its award-winning platform that integrates Web application scanner, Web application firewall, CDN, and threat information engine.

AlgoSec for IaC: How to identify risks from your pull requests

This video demonstrates how the AlgoSec platform integrates into your DevOps workflow early in the game, automatically identifying connectivity risks and providing ways to remediate them. You never have to leave where you're working to write better code. IaC Connectivity Risk Analysis enables immediate feedback right where you're working in the pull request by providing risk check results as comments.

Cybersecurity Advice for Businesses Without Information Security Professionals

In this video, we explore what businesses without information security professionals can do to protect themselves from cyber threats. While it would be ideal for all businesses to have experienced cyber personnel who can advise on critical assets and best steps, this is not always possible. Connect with Your host James Rees Hello, I am James Rees, the host of the Razorwire podcast. This podcast brings you insights from leading cyber security professionals who dedicate their careers to making a hacker’s life that much more difficult.

Nightfall AI Rightway Case Study Part 2

Karim Beldjilali, current Nightfall CISO and former CISO of Rightway, speaks about how security has shifted from prevention to safe enablement of collaboration. This informed Karim's selection of security tools as he knew he needed to leverage HIPAA compliance solutions. in line with this philosophy.