Building a Career in Incident Response With Cybersec Meg
Cybersecurity is one of the fastest-growing industries, while cybersecurity professionals are some of the most valuable workers of any organization, regardless of the industry. There is some talk of a cybersecurity skills gap that claims a shortage of professionals, but is that true? Or is gatekeeping dictating unrealistic expectations for entry-level positions, making it harder for newcomers to break into the industry?
Making Cybersecurity Accessible with Scott Helme
Global connectivity benefits our world in numerous ways, however, that same connectivity also poses a potential cyberthreat that is often overlooked. There is no easy solution for combating the rising threats in our hyperconnected world. Now more than ever, cybersecurity is imperative for both businesses, governments and educational institutions, and individuals and families. For cybersecurity to effectively slow down the rising cyber threats and attacks, everyone needs to be part of the solution.
Residential Evil: Addressing the Role of Anonymization Infrastructure in Cybercrime with Tom Kilmer from Spur
In recent years, more emphasis is put on privacy concerns and data security while online. The shields at the forefront of this battle for privacy and secure internet access are VPNs and proxies, and more notably residential IP proxies. While claiming to offer anonymization to users, residential proxies also account for some security issues.
#ProTips: Understanding a Leaky Internet with Gregory Boddin
Over the past few years, data breaches involving millions of leaked records have become the norm. A common offender we’re seeing more of is the presence of poorly secured and misconfigured databases connected to the Internet.
Reblazing Web Security, Announcing a New Product, and Listening to Records with Tzury Bar Yochay from Reblaze
Web applications contain sensitive data like user information, financial data, and intellectual property. That data is valuable and alluring to malicious attackers. Cyber attackers looking for vulnerabilities and weak spots to gain unauthorized access for stealing data keep web applications under constant threat.
Cats, Board Games, and Analyst-Centric Threat Intelligence: Speaking with Pulsedive Co-founders Dan Sherry and Grace Chi
Two heads are better than one, and the same rings true when starting a company. You can have the idea, the entire business plan set out, the drive and desire needed, but there might be something missing. This is where most founders turn their focus to the search for a perfect co-founder. A co-founder that complements their skills, helps them turn their ideas into reality, brings a fresh perspective, and is there to support them.
Builders vs Breakers: Bridging the gap Between Software Development and InfoSec with Tanya Janca
Application security testing and assessment commonly occurs toward the end of the standard software development life cycle (SDLC). During this time, code reviews and penetration tests are done to ensure no security flaws or bugs are found in the application before it moves on to production. As much...
From heroes to deviants: Discussing the cultures of hacking with Gabriella Biella Coleman
When talking about hacker cultures, the media often blurs the lines between the act of hacking and criminality, inadventaly propping up stereotypes that plague the figure of the hacker. In reality, hackers feed into a socially and politically significant subculture with unique social and behaviora...
SecurityTrails Year in Review 2019
Now’s the time when we can take a thoughtful step back and reminisce about the events that have unfolded over the year. Please join us as we take a look at the many milestones, developments and innovations SecurityTrails has seen during the past twelve months.
#ProTips: Silence the noise with Andrew Morris
The Internet is a noisy place; those listening to it know that all too well. SOC teams keep busy with numerous threat protection products that generate countless security alerts, many uncontextualized, some downright pointless. And figuring out who’s behind those alerts is not easy.