Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

"Q&A: Digital Threats Landscape" with Joseph Menn

Join us for an insightful conversation with Joseph Menn, veteran cybersecurity reporter for the Washington Post and author of "Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World." In this closing keynote discussion, Menn shares his perspectives on the evolution of cybersecurity, exploring the complex relationship between technology advancement and security.

How to Perform Hyper-V Storage Migration: A Step-by-Step Guide by NAKIVO

Hyper-V Storage Migration is Microsoft’s technology for moving the storage of virtual machines (VM) from one location to another without resulting in compatibility issues. Moreover, Hyper-V Storage Migration can be performed on live VMs, allowing you to avoid any downtime and continue business operations as usual. Watch this video walkthrough on how to use Hyper-V Manager and PowerShell to launch and configure Hyper-V Storage Migration.

Cloud Trends : How They're Reshaping Cybersecurity

Cloud adoption is accelerating, but with it comes new security challenges. In this video, we discuss: The rise of multi-cloud and hybrid cloud strategies. Key security concerns like visibility gaps and the shared responsibility model. How to stay secure while trusting—and verifying—your cloud provider. Takeaways: Understand cloud trends, security risks, and your role in protecting your workloads.

The Role of the CISO Will Become the Least Desirable in Business | 2025 Cybersecurity Predictions

The CISO is a human-centric role. The biggest issues that CISOs typically encounter are not technical problems but human and governance problems. In 2025, we predict that as regulatory and policy demands for CISOs grow, including requirements for the CISO to personally certify the cybersecurity integrity of their business, the CISO role will become the least desirable in business.

See Falcon Cloud Security in Action

Cloud exploitation grew 95% over the past year, with adversaries becoming even more focused and persistent. Watch how Falcon Cloud Security stops breaches with truly unified agent and agentless protection, from endpoint to cloud. CrowdStrike Falcon Cloud Security: ► Stop cloud breaches and consolidate disjointed point products with the world’s only CNAPP built on a unified agent and agentless approach to cloud security for complete visibility and protection.

Falcon Cloud Security Application Security Posture Management: Demo Drill Down

Protecting your software from adversaries requires a precise understanding of production. Watch how Falcon ASPM empowers security teams to stop adversaries from breaching their custom applications. CrowdStrike Falcon ASPM: Prioritize and mitigate cloud threats with unmatched application visibility and business context. Subscribe and Stay Updated: ► Don't miss out on more exciting content! Subscribe to our channel for the latest updates, case studies, and more from the world of cybersecurity. Hit the bell icon to receive notifications whenever we post new videos.

Exploited! Kerio Control's HTTP Response Splitting Vulnerability (CVE-2024-52875)

CVE-2024-52875 is an HTTP Response Splitting vulnerability in Kerio Control. This flaw allows an attacker to inject malicious input into HTTP response headers by introducing carriage return (\r) and line feed (\n) characters. Such manipulation can cause the server to send multiple HTTP responses instead of one, leading to various attacks.