Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Bulletproof State of Cyber Security Report 2023

The 2023 #Bulletproof State of Cyber Security Report is out now! In it we’re using real-world data to look at the actual threats business are facing, and what you can do about them. We’re talking about the changes to the threat landscape, how the behaviour of cyber criminals is evolving, and how to leverage threat data for increased efficiency. For a more complete picture we’re also exploring updates and changes in the world of compliance, including #GDPR, #PCI, #ISO27001, and #CyberEssentials.

PAM Masterclass - Episode 1: Streamlining privileged account governance

In the very first episode of our PAM Masterclass, we’ll learn the essentials of privileged account governance and uncover ways to automatically discover, consolidate, and manage all your privileged identities and resources from a central console. Here's a quick brief on what we will cover in this episode.

Psychological Warfare: How Hackers Exploit Your Sense of Security

Have you ever felt completely safe in the comfort of your own home, surrounded by loved ones? Cybercriminals know this feeling all too well, and they're using it to their advantage. In this eye-opening video, we delve into the world of psychological warfare in the realm of cybersecurity. We discuss how hackers are no longer interested in just stealing data or causing chaos - they want to get paid, and they're going after high-profile targets, including executives, politicians, and R&D leaders. We examine how hackers use it to gain leverage over their victims.

DevSecOps toolchain

Are you using security tools such as Semgrep, Prowler, KICS, Semgrep, OWASP ZAP, NPM-Audit, Ttivy or others as part of your DevSecOps Toolchain? How do you monitor or get reports from each one of those security tools? Do you implement and configure them manually across all your resources? Jit is an open DevSecOps Orchestration Platform; get your first scan in 5 minutes; you’ll enjoy a fix-focused, native developer experience and comprehensive AppSec visibility.

Is Your LinkedIn Profile Putting Your Security at Risk?

In today's age of information, it's becoming increasingly easier to gather information on anyone, including their professional lives on platforms like LinkedIn. While it may seem harmless to check out a colleague's profile or connect with a friend, it's important to consider the potential security risks involved. In this video, we explore the growing concern of side-channel attacks, where hackers can gain access to personal information through the connections and networks of individuals. We discuss how to identify potential risks and take steps to safeguard your personal and professional information.

Fuzzing in Jest - One Unified Workflow for Functional and Security Testing

In this coding session, fuzzing expert Josh Grant will demo how the integration of Jazzer.js into Jest enables a unified workflow for functional and security testing in JavaScript. All with the familiar look and feel of a unit test.

Create AWS Honeytokens easily to catch hackers

learn how to create AWS Honey Tokens that alert you when someone attempts to use them. Honey tokens are API or access keys that are real but harmless and can be used as an early warning system to know when an intruder has made it into your system. In this video, we run through the simple steps to be able. to create your very own AWS Honey Tokens using an open-source project and all your own infrastructure.

Arctic Wolf Helps Edmentum Have Confidence in Their Data Confidentiality

As a provider of digital, online curriculums for personalized learning experience both across the US and around the globe, the pandemic caused Edmentum to scale, fast. That growth in business required a new dedication to security as the organization needs to keep their clients’ data safe while maintaining regional, state, and federal compliance.

The Dark Net's One-Stop-Shop for Cybercrime: Ransomware

In this video, I'll be taking you on a chilling journey through the inner workings of the dark net's cybercrime underworld. I'll show you how easy it is to buy a compromised server, purchase ransomware-as-a-service components, and install an Xbox kit to deploy the attack with friends. But the real eye-opener is the endgame: turning the stolen Bitcoin into cash. I'll reveal how Tumblr services on the dark net are used to launder money, and how traditional criminals use Doctrine to convert it into physical cash. Join me as I guide you step-by-step through this one-stop-shop for cybercrime, and expose the alarming ease with which it can all be accomplished. - Oliver Rochford