Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Random but Memorable: People's Choice Bonus Episode

Surprise! We're back for a very short and sweet bonus episode. 🥳 🏆 We've been nominated for the 2023 People’s Choice Podcast Awards in the This Week in Tech – Technology category! You can help us win our first award – support the show by signing-up and voting for Random but Memorable today! 🏆 It would mean a lot to our team if you could spare a few minutes to vote.

Keeping your SLED Secure: Should you pay a ransom?

In this week's episode, Bill and Robin respond to a viewer request, and delive into the world of State, Local Government and Education, and how they can stay protected and secured with limited budgets. We cover documents issued by the FBI regarding how to stay safe, and also discuss how some OEM vendors are advocating that SLED organisations should just pay whatever ransom has been asked. Will this make the threat actors go away, or will they be here to extort another day?

AI is the Future of Cybersecurity. Here Are 5 Reasons Why.

While Gen AI tools are useful conduits for creativity, security teams know that they’re not without risk. At worst, employees will leak sensitive company data in prompts to chatbots like ChatGPT. At best, attack surfaces will expand, requiring more security resources in a time when businesses are already looking to consolidate. How are security teams planning to tackle the daunting workload? According to a recent Morgan Stanley report, top CIOs and CISOs are also turning to AI.

Session management security: Best practices for protecting user sessions

Session management security is an essential component of web application development. It safeguards user sessions and prevents unauthorized access. Managing sessions secures the confidentiality, integrity, and availability of sensitive user data. It also protects user privacy at large — which is essential to maintaining user trust in an application. When we manage sessions securely, we establish processes to destroy session tokens when users log out or their session ends.

27 Cybersecurity Professionals and Business & Technology Leaders Reveal the Most Important Cyber Risk Trends Companies Need To Look Out for

Cyber risk trends are constantly evolving, driven by the pace of technological advancements that streamline business processes yet can introduce vulnerabilities in your company’s attack surface. With increased use of SaaS, cloud solutions, APIs, and third-party services, companies have many exposed and connected internet-facing assets that they’re unaware of, providing an open door for attackers to exploit.

Reality of Cyber Warfare: Election Meddling

In this thought-provoking video, we delve into the realm of cyber warfare and explore the intriguing possibility of election meddling. Join us as we examine the scenario where a specific president, who was expected to secure victory, fell short. Could it be easier to believe that someone interfered with the election rather than accepting defeat? Let's challenge our assumptions and explore whether this candidate truly embodied the desires of the people. Don't miss this insightful discussion on the potential influence of cyber warfare on electoral outcomes.