Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI: What's the future smell like? | AI Avenue Ep 6

In the season finale, Craig and Yorick take a big whiff of the future. What is our world going to look like? Which future do you want? The sit down with thought leaders from Cloudflare, @IBM, Science Fiction author, and a 9 year-old vibe coder/comedian named Fay. The future is bright if you want it to be.

Copilot Readiness - Tighten Data Controls to Scale Secure AI

Join us for Day 3 of the Netwrix Innovation Week Podcast Series, part of Cybersecurity Awareness Month. In this episode, Farrah Gamboa and Hanan Levy discuss how organizations can prepare for Microsoft 365 Copilot by strengthening governance around data and identities. They share insights on preventing oversharing, reducing excessive permissions, and closing compliance gaps before deploying AI tools.

Automated provisioning and governance for healthcare company, B Braun

Join B Braun representatives Andreas Müller, IT project manager, and Michal Kasynski, identity manager engineer as they explore their choice of One Identity Manager for their healthcare and pharmaceutical company’s identity governance and administration (IGA) needs.

Ep 14: Security IS observability: Prove us wrong

In this episode, we discuss the critical intersection of security and observability within organizations. We highlight the often contentious relationship between security analysts and SREs, emphasizing the importance of fostering a collaborative culture to effectively address incidents. All teams should focus on solutions rather than blame, as user experience is affected by both security and infrastructure issues. We explore how to break down silos, especially in the context of AI security, and encourage cross-disciplinary learning to enhance overall security practices.

PhishinGit - GitHub.io pages abused for malware distribution

This blog discusses PhishinGit, a phishing campaign uncovered by CYJAX that abuses GitHub.io pages to distribute malware disguised as Adobe downloads. It explains how threat actors used Browser-in-the-Browser (BitB) techniques, Dropbox-hosted payloads, and anti-analysis JavaScript to evade detection. The blog also explores the attack chain, observed mitigations, MITRE ATT&CK mapping, and indicators of compromise (IOCs) to help organisations identify and defend against similar threats.

PCI DSS Compliance for E-Commerce: How to Secure and Monitor Payment Pages

Modern checkout pages have evolved from static forms into dynamic ecosystems where dozens of third-party scripts run alongside first-party code. This complexity expands the attack surface and challenges traditional defenses designed for fixed perimeters. PCI DSS 6.4.3 was introduced to address that shift, emphasizing continuous oversight of browser-executed scripts and the integrity of client-side behavior.

CJIS Security Policy compliance: An extensive guide

The Criminal Justice Information Services Division (CJIS) within the FBI manages Criminal Justice Information (CJI). Considering the highly sensitive nature of law enforcement data, you have to implement federal security standards to safeguard CJI against increasingly complex cybersecurity threats. ‍ The CJIS Security Policy was introduced in 1992 as a framework to protect CJI through both strategic and tactical measures.