Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Coffee Talk with SURGe: 2022-MAY-17 Conti Hits Costa Rica, Cardiologist Ransomware, CISA MSP Alert

Coffee Talk with SURGe! Grab a cup of coffee and join Audra Streetman, Mick Baccio, and special guest Haylee Mills for another episode of Coffee Talk with SURGe. The team from Splunk discussed a ransomware attack that prompted Costa Rica to issue a state of emergency, a cardiologist in Venezuela accused of building ransomware tools, and an alert from CISA warning about cyber threats to MSPs. This week Audra and Haylee competed in a 60 second charity challenge on "certs vs. degrees" in cybersecurity before taking a deep dive into Splunk Risk-Based Alerting.

Introducing the first web3 engine.

Fireblocks Web3 Engine is the most comprehensive and secure suite of Web3 solutions for gaming studios, NFT services, and enterprises building the next generation of Web3 products. The Fireblocks Web3 Engine consists of 3 product suites: The #DeFi Suite: Build new DeFi-enabled Web3 services to generate yield for users, with connection to the widest range of both EVM and non-EVM blockchain protocols.

Random but Memorable - Episode 9.5: Weirdest Mobile App Documentary

On the show today, we cast our own Conti ransomware documentary and, in Watchtower Weekly, we marvel at government quantum computing. We also invite 1Password's Director of Product Design, Jamie Heuze, to discuss 1Password 8 on iOS and Android – now in early access!

OWASP Bay Area Meetup Host Sponsored by JFrog - April 28

Followed by talks Talk #1 Demystifying the SBOM’s impact on Secure Software Deployment With the White House’s cybersecurity executive order in May 2021, has the Software Bill of Materials (aka SBOMs), graduated from being a “nice to have” to a “must-have” global standard when developing and deploying secure software from the cloud? In a nutshell, SBOMs provides visibility into which components make up a piece of software and detail how it was put together, so it's easy to determine if it contains security and compliance issues. In this talk, we’ll discuss • What exactly is an SBOM? • Securing your Software Supply Chain • Why SBOM must be a key element of your software development life cycle's (SDLC) security and compliance approach • The misconceptions that exist around SBOMs • Insights and best practices on SBOM creation and usage.

Zero Trust - Replacing Depth with Logic. Identity & Access Management eSummit 2022

In a hybrid work setup, workers should be able to authenticate themselves in the virtual environment securely. However, identity theft and technologies like deep fakes ensure that securing identities remains a major challenge. Organizations want to ensure their identities are safe and hack-proof. Join industry leading practitioners and experts to learn how to protect identities.