Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to

Rubrik and GraphQL - Episode 2 - GraphQL Queries

At the core of GraphQL lies the query. Queries allow us to fetch exactly the data we need from the Rubrik platform. This episode will dive into how we form basic queries to retrieve Rubrik objects for usage with automation. We’ll talk about how to form a query, create fragments, and pass data into our queries using variables.

Black Hat 2022: The CVSS Fallacy - can you trust the world's most popular vulnerability metric?

The NVD defines one of the usages of CVSS as “a factor in prioritization of vulnerability remediation” and it is the current de-facto vulnerability metric, often seen as infallible guidance and a crucial element in many compliance processes. In our session we will go over real-world CVE examples, demonstrating cases and entire categories where CVSSv3.1 falls short of providing an accurate assessment, both due to its design and its various mishandlings. The session will also touch upon specific indicators in the CVE description that can raise the confidence in a CVSS score, and vice versa.

3 Cases of Hacked IoT Devices -- LogSentinel

internet of Things is a network of interconnected devices, software, sensors, or people that are provided with unique identifiers (UIDs), with the ability to transfer data over a network without the need for human interaction. Many #IoT devices remain unmonitored and improperly managed. These risks can become life-threatening when it involves the #healthcare sector. LogSentinel presents 3 notorious cases of hacked IoT devices and ways to keep your IoT devices safe. Monitoring threads and mitigating the risk for #cybersecurity in your organization is crucial.

JUMPSEC Summer Industry Briefing Understanding your Attack Surface

Understanding Your “Attack Surface” presented by Max Garaffa Attackers can access a huge amount of open-source information about your organisation over the internet. You will learn how to locate this information, understand what is most dangerous, and what you can do to counter the threat. This intelligence can be used for both offence and defence, which we have explored in recent engagements for our clients.

5 Major Cyberthreats Facing the BFSI Industry

Cybersecurity in the BFSI industry is one of the critical areas of concern today. The banking and financial services industry is highly regulated on the cybersecurity front. Why is it so? The total cost of data breaches in the financial sector in 2021 was USD 5.72 million on average, second only to the healthcare industry. The growing sophistication, severity, and lethality of cybersecurity threats to the financial sector further accentuate the industry’s challenges.

Creating a .gitignore file - How we can use git ignore to prevent adding unwanted files to git

A.gitignore file is a great and simple tool we can use to prevent including unwanted files in a git repository. This file can be used to simply ignore files and directories but also be used to create complex rules and partial rules to ignore select files. In this video GitGuardian developer advocate, Mackenzie, runs through exactly how to get started with both a local and a global.gitignore file and shows exactly how the file works. This is designed as an introduction so that you have the knowledge to understand more complex uses for the.gitignore files.