Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to

Building North Star Metrics for Security Teams | Mona Salvi (Senior Director, HubSpot)

Here are some highlights of the conversation between Mona Salvi (Senior Director - Product Security, HubSpot) and Venky (Founder, Indusface). She talks to Venky about building a unified organization structure and North Star metrics to drive security-related initiatives in a cohesive working environment. She also shares how to manage three pillars - platform security + trust & safety + payments fraud together under a single leadership umbrella.

Protecting from Threats Caused by OpenAI and LLM Tools | Mona Salvi (Senior Director, HubSpot)

Here are some highlights of the conversation between Mona Salvi (Senior Director - Product Security, HubSpot) and Venky (Founder, Indusface). She talks to Venky about building a unified organization structure and North Star metrics to drive security-related initiatives in a cohesive working environment. She also shares how to manage three pillars - platform security + trust & safety + payments fraud together under a single leadership umbrella.

How To Create A Strong Password

Weak passwords are an open invitation to cybercriminals that can lead to unauthorized access, identity theft and compromised accounts. By incorporating complexity, length and uniqueness into your passwords, you'll significantly enhance your online security. Learn more about creating strong passwords and protecting yourself on line with Keeper.

Friday Flows Episode 6: Normalize Alerts with ChatGPT

The strides in GenAI have been remarkable this year, but we're all still trying to figure out how to impact our day-to-day work. In this demo, we use AI in the best way we know how to at Tines: by speeding up a security analyst's work and making their life a little easier! Use ChatGPT to normalize alert formats, in this case from CRWD. Alerts from multiple sources are converted into a standard format for easier processing by a SOC, and a ticket is then created.

How Social Engineering Took Down MGM and Caesars

Two major players in hospitality and gaming, MGM and Caesars, were victims of two, separate cyber attacks. While the details are still unknown, what is known is that Caesars paid the hackers a multi-million dollar ransom, and that both attacks began with social engineering.

Shift Left: A One-of-a-Kind Developer Community in the Cybersecurity Space

To foster a culture of data protection that enhances global enterprises through secure application development, Protegrity developed the Shift Left Developer community. Our community recognizes the discrepancies and challenges data teams face when it comes to implementing solutions – both technologically and professionally – and offers the resources, guides, and cross-collaboration from teams around the world to help develop effective and efficient approaches to integration processes.