Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike Store - Falcon Intelligence

Description: In this video, we will demonstrate the power of the automated threat intelligence available with Falcon Intelligence. Having sandbox analysis available directly in the CrowdStrike UI provides security teams with more context to make security decisions while also making them more efficient and effective given their limited time and resources.

Introduction to OWASP's Vulnerable Node.js Apps: Part 1 | Snyk

Introduction to OWASP's Vulnerable Node.js Apps During this livestream we give an introduction to a vulnerable Node.js application created by the OWASP organization. We also show how some of the OWASP Top 10 security risks apply to web applications, and also how to mitigate these concerns. Didn't catch the live stream? Ask all of your Snyk questions and we’ll do our very best to answer them in the comment section.

Stranger Danger: Your Java Attack Surface Just Got Bigger

Building Java applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome, you're a cloud native application developer! As developers, our responsibility broadened, and more software means more software security concerns for us to address.

Machine Learning in Security: NLP Based Risky SPL Detection with a Pre-trained Model

The Splunk Vulnerability Disclosure SVD-2022-0604 published the existence of an attack where the dashboards in certain Splunk Cloud Platform and Splunk Enterprise versions may let an attacker inject risky search commands into a form token.

How to Securely Share Passwords with Third Parties Using Keeper

The popularity of freelancing has continued to rise in the United States. In fact, a majority of organizations in America have worked with freelancers and plan to hire them again, according to data from the LinkedIn Workforce Report. In the post-pandemic world, there are a massive and growing number of digital nomads, people who choose to travel while working remotely from anywhere in the Internet-connected world.

Protecting Healthcare Payments from Cyber Attacks: Tools and Strategies

In April 2022, a medical billing company based in New York became the victim of a serious ransomware attack. Bad actors stole personal and financial data of patients from 26 healthcare institutions who were the company’s clients. The billing company had to notify almost 1 million individuals that their data had been stolen. Over the last few years, organizations and fintechs that process payments for healthcare providers have become a hot target for cyber attacks.

The Role of AI/ML and Automation in CyberSecurity

Let’s talk about having automation tools and AI/ML for cyber security. To combat the bad guys trying to break into your environment all the time, you need tools that can: In fact, you must automate 99% of your alerts because if humans have to do it, they will feel overloaded and make mistakes. But you can’t replace human judgment. It’s like flying a plane. Most of the time, it flies on autopilot. But at crucial moments like take off, landing, or when there’s a thunderstorm, the pilot disengages the autopilot and actively takes the wheel.

Coffee Talk with SURGe: Ukraine War, GRU Hactivist Coordination, Network Monitoring, Optus Breach

Grab a cup of coffee and join Audra Streetman and special guests David Bianco and Haylee Mills for another episode of Coffee Talk with SURGe. The trio will discuss the latest cybersecurity news, including: Haylee and David competed in a 60 second charity challenge to explain the concept of domain shadowing. The team also discussed the Uber hack as it relates to general security practices at companies.

How to Engage Developers to Build a Successful Application Security Program

If you’re helping shape application security in an organization, whether as an external security consultant or vendor, or as part of an internal security team, it is critical to work effectively with developers. While a lot of individuals have an interest and stake in security, and many have a significant role to play, developers who write code and fix flaws determine whether application security initiatives succeed or fail.