Hive Systems
Hive Systems
  • 59
  • 33 312
Meet Derive
Derive enables cyber managers, boards, and executives to optimize their cybersecurity budgets and apply their funds wisely. Our next-gen risk assessment platform revolutionizes cyber risk management with comprehensive, quantitative assessments powered by the most extensive data on cyber breaches and mitigations. With Derive, organizations can precisely track the ROI of cyber investments, ensuring every dollar spent mitigates potential losses effectively.
มุมมอง: 9

วีดีโอ

Cybercrime Running Rampant (and Martian Hackers)
มุมมอง 9012 ชั่วโมงที่ผ่านมา
Our CEO, Alex was interviewed on Bootstrapping with Dylan Ratigan about the current state of cybersecurity. They talked about everything in the world of cybersecurity from Martian hackers, to securing nuclear floppy disks, to staying safe in the digital age. Check out this engaging interview from our friends at @tastylivetrending.
How to Build a Better Cybersecurity Risk Assessment
มุมมอง 2214 ชั่วโมงที่ผ่านมา
⏩ Rapidly build cybersecurity risk scenarios with Derive. Watch Corey build them in real time and then experience it for yourself at www.deriverisk.com
Comparing Cybersecurity Controls with Derive
มุมมอง 47วันที่ผ่านมา
Derive allows you to rapidly compare and contrast different cybersecurity controls so you know where how to get the most return on your cybersecurity investments. See more at www.deriverisk.com
CMMC is starting to get teeth
มุมมอง 9วันที่ผ่านมา
The quick clip from our recent Hive Live episode looks at the ways that the CMMC program is starting to get teeth. And to see more, check our the full episode at th-cam.com/video/ZJ5daztr3sk/w-d-xo.htmlsi=T_ayOmpV2cEdexg_
Government Cyber Compliance Updates Super Special!
มุมมอง 130หลายเดือนก่อน
Are you a cloud service provider or defense contractor? Then you should be closely following the recent deluge of updates that have been happening to the security requirements and processes around your favorite government-related cybersecurity compliance frameworks. But if you’ve fallen behind, fear not! Our experts have you covered. In this episode, Alex, Andrew, and Katie from Hive Systems wi...
What does cybersecurity look like in 2024 and beyond?
มุมมอง 40หลายเดือนก่อน
Our CEO, Alex, was interviewed by @BrightTALK at the 2024 Infosecurity Conference in London where he discussed a number of items including: ❯ What he's excited about in the world of cybersecurity in 2024 ❯ How leadership and executive teams are now focused on cyber risk ❯ How cybersecurity teams are now on the hot seat Watch him discuss upcoming cybersecurity trends heading towards the end of t...
Hive Systems on WWBT - Avoiding Online Job Scams
มุมมอง 1.3Kหลายเดือนก่อน
Our CEO, Alex, was interviewed on WWBT where he discussed ongoing job scams. He discusses a number of items including: ❯ The main types of job scams; ❯ How to identify that you may be a target for a job scam; and ❯ Where to report a scam if you identify one or fall victim to one. You can find more resources on job scams from the FTC at consumer.ftc.gov/articles/job-scams
Derive: AI-accelerated next-gen cyber risk assessment platform
มุมมอง 222 หลายเดือนก่อน
[Learn more at www.deriverisk.com] Derive is an AI-powered cyber risk assessment and management SaaS. It enables organizations to make data-driven cybersecurity decisions continuously. The DIALED data stream updates risk models with current insights on data breaches and mitigation. Derive helps prioritize cybersecurity strategies based on empirical data and financial impact, aligning with frame...
The 2024 Hive Systems Password Table: What it Really Says
มุมมอง 9174 หลายเดือนก่อน
You’ve seen it in the news, published by universities, and shared by thousands of companies across the globe as it’s gone viral - it’s the 2024 Hive Systems Password Table. It’s a great conversation starter about cybersecurity best practices and there’s a lot of layers behind this eye-catching table. So what was our methodology this year for the time it takes a hacker to brute force your passwo...
Hive Systems Feature on BBC
มุมมอง 694 หลายเดือนก่อน
Hive Systems was featured on the BBC Newsroom on May 10 with an in depth discussion about our 2024 Password Table. Have a listen!
Welcome to Hive Live!
มุมมอง 974 หลายเดือนก่อน
Welcome to Hive Live! Watch featured webinars, panels, office hours, and presentations from our experts at Hive Systems. Find out more at www.hivesystems.com/hivelive
Brace for Impact: CMMC is Coming
มุมมอง 5045 หลายเดือนก่อน
For any company in the Defense Industrial Base (DiB), you know that the Cybersecurity Maturity Model Certification (CMMC) has been in development for years. Well that reckoning is here and in this episode of Hive Live, we’ll embark on a comprehensive exploration of CMMC and its profound implications for defense contractors. With cybersecurity becoming increasingly paramount for the Department o...
Bayesian Modeling of Cyber Risk
มุมมอง 2137 หลายเดือนก่อน
Risk assessment is challenging when data is unavailable, hard to obtain, or costly to process. Organizations often request estimates from experts instead. This talk demonstrates how to integrate cybersecurity data with expert estimates using Bayesian modeling in PyMC. Cybersecurity analysts, resource managers, and executives can use Bayesian models to perform risk assessments, select security c...
AI & Cybersecurity: Exploring the Double Edged Sword
มุมมอง 1328 หลายเดือนก่อน
The age of artificial intelligence (AI) is upon us, so how do we harness the latest technology WHILE securing our information? In this episode, we dive into the dynamic intersection of cybersecurity and AI, exploring the evolving landscape where technology meets cybersecurity. As our reliance on digital systems grows, so do the threats, making the relationship between cybersecurity measures and...
Hive Systems on WWBT - New Year's Cybersecurity Cleaning List
มุมมอง 738 หลายเดือนก่อน
Hive Systems on WWBT - New Year's Cybersecurity Cleaning List
Hive Systems on WWBT - Cybersecurity Awareness Month
มุมมอง 1818 หลายเดือนก่อน
Hive Systems on WWBT - Cybersecurity Awareness Month
Audora: Audit efficiency and cybersecurity expertise in one product
มุมมอง 3510 หลายเดือนก่อน
Audora: Audit efficiency and cybersecurity expertise in one product
Cybersecurity Horror Stories
มุมมอง 18611 หลายเดือนก่อน
Cybersecurity Horror Stories
Secure What you Know About: An Intro to Security Configuration Management
มุมมอง 562ปีที่แล้ว
Secure What you Know About: An Intro to Security Configuration Management
Talk the Talk: Communicating Business Risk During Cyber Incidents
มุมมอง 173ปีที่แล้ว
Talk the Talk: Communicating Business Risk During Cyber Incidents
The 2023 Hive Systems Password Table: What it Really Says
มุมมอง 1.5Kปีที่แล้ว
The 2023 Hive Systems Password Table: What it Really Says
A Deep Dive on the NIST 800-53 Rev.4 to Rev. 5 Transition - Part 2
มุมมอง 602ปีที่แล้ว
A Deep Dive on the NIST 800-53 Rev.4 to Rev. 5 Transition - Part 2
A Deep Dive on the NIST 800-53 Rev.4 to Rev. 5 Transition - Part 1
มุมมอง 1.7Kปีที่แล้ว
A Deep Dive on the NIST 800-53 Rev.4 to Rev. 5 Transition - Part 1
Approachable Control Frameworks: Understanding CIS Top 18
มุมมอง 4.2Kปีที่แล้ว
Approachable Control Frameworks: Understanding CIS Top 18
Is This a Cybersecurity Incident, or Just an IT Issue?
มุมมอง 256ปีที่แล้ว
Is This a Cybersecurity Incident, or Just an IT Issue?
Cybersecurity Risk Assessment with Bayesian Networks in 2022
มุมมอง 509ปีที่แล้ว
Cybersecurity Risk Assessment with Bayesian Networks in 2022
Getting into Cybersecurity: A Roundtable About Our Journeys
มุมมอง 110ปีที่แล้ว
Getting into Cybersecurity: A Roundtable About Our Journeys
Hive Systems Wins at the 2022 rvatech/gala
มุมมอง 59ปีที่แล้ว
Hive Systems Wins at the 2022 rvatech/gala
Gone in 60 seconds: Crypto Attacks Leaving Victims High and Dry
มุมมอง 1362 ปีที่แล้ว
Gone in 60 seconds: Crypto Attacks Leaving Victims High and Dry

ความคิดเห็น

  • @fredl7139
    @fredl7139 19 นาทีที่ผ่านมา

    Nice to be afraid of password weakness. Can you eventually do the calculation against an online service that we are all using , that should be secure enough to not leak password hash ( stored or over the air ) , and that do allow a hudge amount of password attempt. ? I'm sur you will not as it will not benefit to your company. It is what it is ... Now most of the online are request 12+ lenght +max complexity, making sure that many people like my mum may just be afraid of changing her password ...:(

  • @RaghadJohani
    @RaghadJohani 3 วันที่ผ่านมา

    Can't express enough how the video is great, and catches my attention and interest to keep watching! Thank You!

  • @flyboy152
    @flyboy152 22 วันที่ผ่านมา

    Anyone that falls for one of these scams is an idiot. Somehow the idea of "due diligence" is no longer valid, just believe everything some random texter tells you. 🙄

  • @peppigue
    @peppigue 28 วันที่ผ่านมา

    tldr: more farts but poorer sense of smell

  • @KenNeumeister
    @KenNeumeister 28 วันที่ผ่านมา

    technology broke recruiting

    • @HiveSystems
      @HiveSystems 27 วันที่ผ่านมา

      Technology can help in a lot of ways, but it can also create new problems we never anticipated. Always be careful online with the information you share!

  • @carddamom188
    @carddamom188 หลายเดือนก่อน

    Did someone mention cloudstrike? 😂

  • @Mykehawke
    @Mykehawke 3 หลายเดือนก่อน

    The link for whitepaper is giving a 404

    • @HiveSystems
      @HiveSystems หลายเดือนก่อน

      Sorry about that! We've fixed it now: www.hivesystems.com/s/Hive-Systems-SCM-Introduction.pdf

  • @user-zl6eo8zw4m
    @user-zl6eo8zw4m 4 หลายเดือนก่อน

    There is nothing like shifting responsibility...

  • @nimafarshchi5545
    @nimafarshchi5545 5 หลายเดือนก่อน

    Great insights!

    • @HiveSystems
      @HiveSystems 5 หลายเดือนก่อน

      Glad you enjoyed it!

  • @rob1016ny
    @rob1016ny 8 หลายเดือนก่อน

    If you’re asking about the “west”, you have to watch channels outside the US. Info on the equation group is out there, they just leave them out in videos like this.

    • @carddamom188
      @carddamom188 หลายเดือนก่อน

      They must be eagles... Or baldies...

  • @mariaross458
    @mariaross458 10 หลายเดือนก่อน

    Promo_SM

  • @SARBWE
    @SARBWE 10 หลายเดือนก่อน

    This was very useful 👌

    • @HiveSystems
      @HiveSystems 10 หลายเดือนก่อน

      Happy to help!

    • @saadaz86
      @saadaz86 9 หลายเดือนก่อน

      Thanks a lot for sharing this

  • @rahulramteke3338
    @rahulramteke3338 11 หลายเดือนก่อน

    No ameriKKKan APTs? Equation Group? APT-C-41? Amazon Atlas? Longhorn, The Lamberts? Vault7/8? Why are westcuck cybersec companies highly biased? Also, it isnt morally wrong to target ameriKKKa and its infrastructure given thier history (and present, eg: support for isr**l) of interfering with other country's matters

  • @atodaso6301
    @atodaso6301 ปีที่แล้ว

    "Time it takes a hacker to brute force your password in 2023" Title of the table suggests that these estimates are based on modern commercially available hardware at affordable costs to the general public, specifying brute force intrusion as the method which is arguably one of the most costly methods in terms of processing power required. The intro of the video, specifically the first 40 seconds, highlight that these estimates are theoretical and based entirely on future predictions, suggesting that hardware equivalent to that which powers LLMs, like ChatGPT, and quantum computing, will be available to the average malicious actor. This is an absurd claim given the current hardware available to consumers, the cost of server clusters that train and run large language models like ChatGPT (which ranges in the millions USD), and the current progress of quantum computing which likely won't be available to the general public in my lifetime. Misinformation even with good intentions can be harmful. Please label your table correctly, at least next year, but editing this one with a statement to readers on the inaccuracies would be best. I'll even give your TH-cam video a like if you do.

    • @HiveSystems
      @HiveSystems ปีที่แล้ว

      We recommend you watch more than just the first 40 seconds then 😉

    • @atodaso6301
      @atodaso6301 ปีที่แล้ว

      I have, and read through your blog post on the table. To reiterate an important concern though, and my main point: the image you are circulating on social media, and being picked up by news sites, is titled in a way that suggests this is data based on what an average malicious actor can achieve, realistically, in modern times with no indication of hardware used, hashing methods, and so on in the table, with brute force clearly defined in the title as well. The image of the table alone, which is often being shared with no further context, is misleading without proper labeling. Or did you expect everyone on Twitter, Facebook, and Instagram who sees this image to scurry to your 50 minute long youtube video to understand what the information conveys? Infographics are supposed to be clear, easy to understand, and without the need to watch a 50 minute video, read through a blog post, and have some technical understanding to know if the information in the image is accurate or a type of fear mongering meant to, say, encourage the public, especially those less tech savvy, to use the services of a certain cybersecurity company ;)

  • @mundolinux8778
    @mundolinux8778 ปีที่แล้ว

    Congratulations for this table it is a great help

  • @duraidthamer7388
    @duraidthamer7388 ปีที่แล้ว

    TTP is an attack fingerprint or attack vector according to what you mentioned?

  • @networknightmares7744
    @networknightmares7744 ปีที่แล้ว

    It would be very interesting and useful to get information about APT's backed by Western governments, eg UK and USA. Could you direct to any resources on those, the vulnerabilities they exploit and kill chains they use etc?

    • @HiveSystems
      @HiveSystems ปีที่แล้ว

      Great question! Most famously Stuxnet was rumored to have started in the west, but generally there isn't as much information available as other APTs. Why is that? Your guess is as good as ours!

    • @networknightmares7744
      @networknightmares7744 ปีที่แล้ว

      ​@@HiveSystems The Western media is largely controlled by nations within the 5 eyes. They jealously guard the secrecy of their offensive cyber capabilities and 'encourage' their media to cooperate. It worries me that, although we have a lot of threat intelligence on the kind of vulnerabilities, exploits etc used by 'external' APT's and we can incorporate this intelligence in our own cyber defenses, we have no idea about the vulnerabilities, exploits etc used by 'our boys' against 'our enemies'. So far as we know, there could be a whole suite of vulnerabilities kept secret from us, which we can't incorporate into our defenses, which leave us vulnerable. This wouldn't be helpful to the overall global cybersecurity posture. You don't keep yourself safe by making your neighbors less safe.

    • @tonyzone8999
      @tonyzone8999 5 หลายเดือนก่อน

      Put it this way not everyone is always China and Russia. Plausibility is the goal along with psy ops. Many of the attacks of these apts are relatively the same style of attack.

  • @mundolinux8778
    @mundolinux8778 ปีที่แล้ว

    I am here for the 2022 password table in your web page, thanks for share this information with us, good work

  • @ST3ADYxKICKS
    @ST3ADYxKICKS ปีที่แล้ว

    Just thought I’d let you know the algorithm put this video at the top of my suggested page and I was interested enough to click the video. Make a shorter intro to keep retention and keep up the good work

    • @HiveSystems
      @HiveSystems ปีที่แล้ว

      Thanks for the tip and glad you enjoyed it!

  • @niedokazuj8244
    @niedokazuj8244 ปีที่แล้ว

    f888 croocks, 240p for a reason

  • @Soundy88
    @Soundy88 ปีที่แล้ว

    240p thanks...

    • @HiveSystems
      @HiveSystems ปีที่แล้ว

      Agreed! Good news though: we have a new table coming out soon which will have a new high def video to match!

  • @richtheo
    @richtheo ปีที่แล้ว

    What a total load of old rubbish you're talking. This kind of pointless scaremongering isn't helpful.

  • @SaiyanParmos
    @SaiyanParmos ปีที่แล้ว

    Better than any of my professors. You made it way more interesting thank you for the Post

  • @timkirk6237
    @timkirk6237 ปีที่แล้ว

    When's the Quality Going to be Fixed?

  • @d00b3rt
    @d00b3rt 2 ปีที่แล้ว

    Well done! Really engaging and informative. I'd love to see a deep dive on "who joins an APT". Thinking profiling a few individuals who got caught/indicted. Great stuff, looking forward to more!

    • @HiveSystems
      @HiveSystems ปีที่แล้ว

      Great suggestion! We would recommend checking out "Spam Nation" by Brian Krebs for some investigative reporting about that

  • @vickylosada9944
    @vickylosada9944 2 ปีที่แล้ว

    <great post Very detailed and precise video you posted mate love your content. It's funny how some people out there still do. <Great post Very detailed and precise video you posted mate, love your content. It's funny how some people out there still haven't accepted that cryptocurrencies are changing the world globally. Those who are against it have a hard time today. Although I believe from a traders perspective that we really need more experts in this field to educate newbies/investors about how the community works, lately the price of BTC has been fluctuating, which means that the market is currently open and you doesn't say if that's too much. bearish or bullish, this uncertainty drives most traders away and forces investors to hold, I would say it is very wrong to just sit back and wait, maybe take some losses. As an investor, you will find ways to grow and claim more coins. This should be our number one goal for making profits. It all depends on the pattern you are trading and also the source of your strategies. I started with 2 BTC and accumulated over 4.5 BTC in just 4 weeks with the right trading strategy given to me by an experienced trader, Mr. Stephen Trent His methods are top-notch and profitable. you can reach and can be easily integrated via Telegram become [ stephentrent ] and WhatsApp [✙13013388798].

  • @nimafarshchi5545
    @nimafarshchi5545 2 ปีที่แล้ว

    Very informative and great Hive Live - can't wait to tune in for more!

  • @Euzahad
    @Euzahad 2 ปีที่แล้ว

    why put nvideos in such aa terrible quality?

    • @HiveSystems
      @HiveSystems 2 ปีที่แล้ว

      We're working to correct it! Check out our latest videos where we've worked out the bugs!

    • @ddpelayo
      @ddpelayo 2 ปีที่แล้ว

      @@HiveSystems Would you be able to upload it in higher quality at some point? Thanks.

  • @RichMagee1
    @RichMagee1 2 ปีที่แล้ว

    This is a huge help for us, as I've been implementing DKIM, SPF, and finally DMARC for our school's email. We do use several third party providers (like Constant Contact) and I've been able to tweak everything so we're currently at Step 3 with no non-compliant emails in over a week. Every week or two as I get ready to tighten our DNS a bit more I re-watch the appropriate part of this video. Thanks very much!

  • @HiveSystems
    @HiveSystems 2 ปีที่แล้ว

    Links to the information we talked about! . ❯ Download the Hive Systems CMMC 101 whitepaper: www.hivesystems.io/cmmc101-guide ❯ NIST 800-171: csrc.nist.gov/publications/detail/sp/800-171/rev-2/final ❯ NIST 800-172: csrc.nist.gov/publications/detail/sp/800-172/final ❯ CMMC main website: www.acq.osd.mil/cmmc/ ❯ CMMC-AB website: cmmcab.org/

  • @ietian9956
    @ietian9956 2 ปีที่แล้ว

    blockchain cyber security in action, th-cam.com/video/zpnQI4attRo/w-d-xo.html

  • @nandurx
    @nandurx 3 ปีที่แล้ว

    Thanks. Helped a lot.