166 Results
Posted:

Cybersecurity Testing: Tuned for the Test or Tuned for the Real World?

Simon Edwards, Founder and CEO of SE Labs, and Adam Bromwich, CTO of the Enterprise Security Group at Broadcom join Dan in Las Vegas to dive into the details on cybersecurity testing which has been one of the more consistently dramatic topics in the industry. Definitely check out SE Labs to learn more from the best real world performance testing in the industry: https://selabs.uk

Download
Posted:

Diving Deep Into Vulnerability Risk Modeling w/ Empirical Security

Recorded from Hacker Summer Camp in Las Vegas, Dan dives deep into the history and current state of measuring cybersecurity vulnerability risk at scale with the team from Empirical Security. Ed, Michael, and Wade discuss some of the history of vulnerability measurement through the last decade and how they thin the time is now for organizations to start applying highly-specific local vulnerability modeling to their security strategies. There is a ton of amazing information you won't find anywhere else on the Empirical Security Blog: https://www.empiricalsecurity.com

Download
Posted:

Revolutionizing Authentication: Arcot's Smart Ruleset​

Arcot’s August podcast explores how Smart Ruleset is revolutionizing authentication. Powered by 20+ years of transaction data, advanced machine learning, and real-time network signals, this innovation makes smarter authentication decisions in milliseconds – helping issuers block more fraud, approve more legitimate transactions, and cut down false declines. The episode also highlights how 3DS Data-Only flows are gaining traction, giving issuers the richer context they need to improve fraud detection and transaction approval rates.

Download
Posted:

Cybersecurity Tips For Seniors and Parents w/ Alex East

Dan sits down with author Alex East to discuss cybersecurity tips for Seniors and Parents. You can find Alex's books on Amazon: https://www.amazon.com/stores/Alex-East/author/B0D9VCFVPX Sorry about the video quality, the main SSDs on the external recorder was a potato.

Download
Posted:

Preventing a Nuclear Apocalypse with Threat Intel

Paul Miller recounts a critical incident involving threat intelligence that potentially prevented a nuclear disaster. They explore the geopolitical context surrounding the incident, the challenges of incident response, and the complexities of attributing cyber attacks to specific threat actors. The conversation highlights the importance of threat intelligence in understanding and mitigating risks, as well as best practices for incident response in the face of evolving cyber threats. Takeaways - Threat intelligence is crucial for understanding cyber threats. - Geopolitical events can significantly impact cybersecurity. - Incident response requires quick decision-making and analysis. - Attribution of cyber attacks is complex and fraught with challenges. - Cybersecurity incidents can have far-reaching consequences. - Effective communication with government agencies is essential. - Historical data analysis is key to threat hunting. - Most cybersecurity work involves routine tasks, with occasional high-stakes incidents. - The evolution of cyber threats necessitates constant vigilance and adaptation. - Collaboration within the cybersecurity community enhances overall defense strategies.

Download
View More