Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

2 million .git directories exposed! Why .git folders are sensitive & how they are leaked publicly

In this video, we look through research by CyberNews and other independent researchers that exposes the huge problem of publicly accessible.git directories hosted on web servers. These folders contain all the metadata from a git repository including all the history, commit data and remote host information. These can contain lots of sensitive information that hackers can use to exploit your website and are often very sensitive. We look in detail at what.git directories are, what sensitive information they contain and how they become accidentally public.

3 Key Trends in Today's It Security Landscape

Here are 3 trends contributing to global cyber insecurity: Today, you have digitization of information, the proliferation of OT and IoT devices, web 3, etc., leading to more vulnerabilities. There are also third-party risks that lead to 70% of breaches. We could be doing a great job protecting our company. But then we may send a document to a law firm that gets hacked, and all of a sudden, our sensitive information is out in the open.

Organizations Already Have Your Personal Data For Their Campaigns

Richard Cassidy talks about data breaches in organizations and that some organizations already have your personal data. These organizations can launch campaigns that can affect core belief systems. Richard Cassidy has been consulting businesses on cybersecurity strategies and programs for more than two decades. During his career Richard has been heavily engaged in the design and implementation of infrastructure and cyber security solutions, helping organisations in evolving security, compliance, risk management, data assurance, automation, orchestration and breach response practices.

The Term HACKER Is Not Derogatory Originally | Cyber Security

James Rees talks about hackers or the term HACKER was not derogatory originally, but now, they are malicious actors or cybercriminals. Connect with James Rees Hello, I am James Rees, the host of the Razorwire Podcast. This podcast brings you insights from leading cyber security professionals who dedicate their careers to making a hacker’s life that much more difficult.

Snowflake: SansShell: A Non-interactive Daemon for Host Management

James Chacon, Principal Engineer Learn how Snowflake developed SansShell, an open source tool, to help them audit actions done on a machine, and why they turned to OPA as their authorization mechanism. This session will also cover how the team worked through policy challenges as they scaled.

Styra: Authorization: The Data Gravity Problem

Tim Hinrichs, CTO, Styra, & Co-founder, OPA Learn about some of the most popular design patterns for cloud native authorization and OPA, covering the types of policies, architectures, and data dependencies for each. Also hear about how data volume, dynamicity and consistency can effectively exert gravitational pull to influence your authorization architecture.

Automating Threat Intelligence with CrowdStrike Falcon Intelligence: Executive Update

CEO and Co-founder George Kurtz explains how CrowdStrike is the first company to combine the protective capabilities of endpoint protection with the predictive capabilities of threat intelligence and why it is the key to stopping breaches.