Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 28 - Safeguarding Data in the Cloud

In this episode of the Trust Issues podcast, host David Puner interviews Brad Jones, CISO and VP of Information Security at Seagate Technology. They delve into cloud security challenges, including protecting data in a constantly shifting technological landscape. Jones discusses the importance of establishing trust as a data company and implementing rigorous controls to safeguard sensitive information.

EPP vs EDR - What's The Difference?

With so many different endpoint security options available, it’s essential to understand the features and benefits of each solution before determining which best suits your organisation. The two main forms of advanced endpoint security, as categorised by Gartner, are Endpoint Protection Platforms (EPP) and Endpoint Detection and Response Solutions (EDR). In this blog post, we outline the key differences between the two, how they work and how to get the most out of them.

Turning Intelligence Into Action with Cybersixgill and Torq

No matter the industry, geography, or organizational size, cybersecurity teams are united by their many shared challenges: talent shortages, expanding attack surfaces driven by digitization and remote work, increasing velocity of software development, and the rapidly growing scope and sophistication of global cybercrime. In response, these teams have embraced and incorporated a range of specialized tools within their defensive arsenal in attempt to address and resolve these issues.

Track Risk Trends in your Container Images with Sysdig Risk-based Vulnerability Management

The number of detected common vulnerabilities and exposures (CVEs) has significantly increased in the past decade. In the last five years, security researchers reported over 100,000 new CVEs. The highest reported annual figure was in 2022, with over 25,000 new CVEs. This number can overwhelm any security team if it’s not managed correctly between assessment, reporting, remediation, and monitoring.

Lessons from Lapsus - CISO on Building a comprehensive secrets management program

Following a breach by the Lapsus$ cyber gang, Jason Haddix, then CISO of UbiSoft called over 40 other CISOs to discuss strategies on how to be more resilient to attacks. Those conversations led him to create a 4 step guide to building a comprehensive secrets management program.

Save, sign in, and unlock with passkeys

Passkeys are the future of authentication: they're both safer, and easier to use than passwords. You can now store, manage, and use passkeys to access online accounts through 1Password in the browser. Later this summer, you'll also get the option to secure your 1Password account, unlock vaults, and sign in securely across multiple devices using a passkey.