Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Random but Memorable - Episode 9.8: Sentient Chatbot Croissant Insights

Has a Google AI chatbot become sentient? And will a U.S. ban on the sale of location and health data make a difference? Join us this episode to find out, as we discuss everything from savory croissants to cross-site browser cookies. 🥐🍪 We also invite Scott Lougheed, 1Password’s Manager of Education & Training, to the show, to celebrate the launch of Insights from 1Password: An intuitive new dashboard for 1Password Business users.

1Password Developer Fireside Chat: Serde Deserializers

Join 1Password senior developer, Nathan West, as he discusses Serde, a Rust library that enables Rust to talk to wire formats like JSON, YAML, XML, or more binary formats like MessagePack. Nathan shares how Serde facilitates a way to interchange between wire formats and Rust data in a very efficient way, without going through a lot of intermediary data structures or allocations. Later, Nathan breaks down the Serde data model, and, step by step, takes you through writing a.csv deserializer from scratch.

Why Do You Need Client-Side Security?

Client-side security is important today because of the increase in attacks against individuals using the web to access services that require the sharing of sensitive and personally identifiable information (PII). Feroot enables proactive client-side security programs to protect the customer journey. Our products are designed to significantly diminish a threat actor’s ability to breach customer data or damage websites via client-side attacks. We help cybersecurity and application security professionals guard the customer experience.

Why We Collect Data From 12 Countries

At SecurityScorecard, we're collecting data from 12 different countries. Here's why: Some countries, industries, and organizations are beginning to deploy deception technologies to misrepresent their security hygiene. If you're trying to gather information on the Chinese infrastructure from outside, e.g., your data set will appear sparse because China blocks the view. But if you collect information from outside and inside of China and triangulate the different discrepancies, you get a more accurate representation.

What to Automate First in Your SOC - Intro to Torq Webinar

Automation can transform how security teams operate, but knowing where to start can be the most difficult part. At Torq, we help teams make these decisions every day. Using our no-code automation platform, security teams can be up and running with their first workflow in as little as a few hours. The secret to making it work is our template library. This 45 minutes webinar will show you how to begin an automation program from scratch, using Torq.

Secure your cloud from source to run

Security is changing, you need to adapt to the Cloud. Sysdig: Secure your Cloud from Source to Run. Cloud security that avoids, that alerts, closes gaps, grants access, takes charge. That checks out, that scales up, that keeps up. That’s there From source, to run. That’s Sysdig! A single view of risk. With no blind spots. Rich context to prioritize what matters. With no guesswork. A platform based on open standards. With no black boxes.