Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Interview

2022 Challenger Interview: Vonahi Security + Decipher Cyber

The Decipher Cyber Jenny Challenger Interview features Alton Johnson, CEO and Founder of Vonahi Security, and Karissa Breen, Founder of KBI, the marketing & media company dedicated solely to the cybersecurity sector. About Vonahi Security: Vonahi Security is a cybersecurity company that developed vPenTest, a SaaS platform that automates network penetration testing and delivers continuous testing at a fraction of the cost of an outsourced consultant.

2021 Prediction: Growing awareness of privacy will drive behavior change

In 2021, we predicted that the growing awareness of privacy will drive behavior change. Individuals and organizations are becoming more conscious of how data collected by mobile apps could be used with malicious intent. Burak Agca, Senior Sales Engineer, talks about what we got right, and what surprised us.

2021 Prediction: Mobile will enable ransomware

As many of us continue to stay at home, we are using our phones, tablets and Chromebooks more – both for personal and work purposes. With their small screens and multitude of messaging channels, they are a perfect vector for phishing messages aimed at stealing credentials for corporate access. Hear from Kristna Balaam, Senior Security Intelligence Researcher about what we got right, and what surprised us. See our 2022 predictions on our newest blog: bit.ly/3pS3rfb

Layers of API Security and Log4j:Beyond the OWASP Top 10

Matt Tesauro of Noname Security talks about “Beyond the OWASP Top 10” and relates it back to mitigating the Log4j zero-day vulnerability. In this video interview with Information Security Media Group, Tesauro discusses: OWASP #11 and beyond, gaps exposed by Log4j, and how enterprises can address these issues via discovery, detection and response.

15 Minute Friday: How a Leading University Hospital Health System Secures Patient Data with Lookout

Hear a use case of how a leading university hospital secures patient data through its journey to the cloud. In addition to cloud protection, needs quickly were realized for cloud DLP and EDRM to fully secure and keep sensitive data safe and HIPAA compliant in the cloud. In this 15 minute session, we will dive into the problem faced and how it was solved. No sales pitches, no demos, just solutions.