Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The human element in cybersecurity

According to IBM’s Cost of a Data Breach Report 2021, the global average cost of a data breach is estimated to be $4.24 million. Cyberattacks cost organizations time and money, not only in the form of data loss but also through irreversible damage to their reputations, leading to the loss of customers. After security breaches, customer loyalty is almost impossible to regain.

The Log4j Log4Shell vulnerability: Overview, detection, and remediation

On December 9, 2021, a critical vulnerability in the popular Log4j Java logging library was disclosed and nicknamed Log4Shell. The vulnerability is tracked as CVE-2021-44228 and is a remote code execution vulnerability that can give an attacker full control of any impacted system. In this blog post, we will: We will also look at how to leverage Datadog to protect your infrastructure and applications.

Product update: IDcentral's Liveness Detection

Concepts like AI-based video editing and augmented video processing are not just buzzwords anymore. Fraudsters now have easy access to plug-and-play products that enable them to use the power of deep learning and advanced AI to anonymize, mask, and alter images and videos. These spoofs also known as presentation attacks include printed photos, cutout masks, digital and video replay attacks, and 3D masks.

Visibility and Security for GKE Autopilot

GKE Autopilot from Google Cloud is a mode of operation in Google Kubernetes Engine (GKE) designed to simplify working with Kubernetes in the cloud. Pairing secure DevOps practices with GKE Autopilot will help you and your teams ensure the security, compliance, and performance of your workloads and applications. Sysdig has collaborated with Google Cloud to enable visibility and security for GKE Autopilot and your containers.

Don't panic, we'll get through Log4shell together

On December 10th, the world was greeted by the latest great cyber security threat, and the developer community globally is working tirelessly to secure their applications. Find out what the notorious Log4shell vulnerability is, how developers and organisations are being affected by it, and what exposed ecosystems are doing to mitigate the risk. Guests Brian Clark - Senior Developer Advocate at Snyk Kyle Suero - Senior Security Advocate at Snyk Chris Russell - CISO at tZERO Alyssa Miller - BISO - S&P Global Ratings

Random but Memorable - Episode 8.4: Smashing Security Christmas Special

What's better than the gift of one security podcast? That's right, it's two! 🎁 Join us for our Smashing Security Christmas Special, a crossover episode filled with so much frivolity it's guaranteed to get you in the festive spirit! We're joined by Graham Cluley and Carole Theriault as we gorge ourselves on the latest security news in Watchtower Weekly. Are Grinch-bots ruining Christmas? And how much do your smart gifts spy on you? Tune in to find out.