Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Post-perimeter security 101: Dawn of a borderless world

The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations to enforce their endpoints and establish continuous conditional access to data based on risk. Aaron Cockerill, Chief Strategy Officer at Lookout discusses how to effectively shift security to your mobile endpoints to protect your company’s sensitive data.

Revealing the Darkweb How to Leverage Technologies to Alert and Block Darkweb Access

We've all seen what's possible with the Dark Web thanks to Silk Road. If you're interested in buying or selling someone's private data like social security numbers or credit card information, it’s disturbingly easy to do. All you need is a computer, a Tor Browser and Cryptocurrency, and it's all completely anonymous.

State of Modern Applications & DevSecOps in the Cloud - 2018

Sumo Logic's report with data-driven insights, best practices, and year-over-year trends - all by analyzing technology adoption among enterprises who run massive applications on AWS, Azure, and GCP. The report also provides additional visibility into the DevSecOps tools and methodologies used within cloud-first organizations as they “lift and shift” or modernize and migrate existing applications to cloud environments.