Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Ransomware Attacks in 2021 And How To Prevent Them

In the last two years, ransomware attacks have drastically increased, and their impact on the organization has become bigger. Bitdefender reports that ransomware attacks increased by 485% in 2020. In this video, we will review what is a ransomware attack and how it spreads across the organization's assets, as well as what types of companies usually get hit by attackers, and how to minimize the risk of getting infected.

Proprietary vs Open Source: Which Software is Better for Your Company Security? (Webinar Cuts)

Proprietary and open source security products each have their own benefits. Proprietary products often have a smaller learning curve which can lead to more efficient learning and operational practices. Open source products can be deployed by anyone without the need for licenses and/or commitments which is ideal for organizations that rely on a wide range of third parties to provide services and products.

On-Premise or SAAS: What Cyber Security Products to Use? (Cybersecurity Roadmap Webinar Cuts)

What to add to your #cybersecurity roadmap? [What Security Products to Use] It is no secret that cybersecurity has grown in importance, but many companies still assume that cybersecurity products require a big budget which makes them unaffordable for small and medium enterprises. This, however, is not necessarily true. During this webinar, we review several important security solutions and hires to add to your 2021 roadmap, as well as tips on how to defend the need for them in front of senior management or the board, and how to find a solution that both guarantees your company security, and is affordable for your organization.

Working From Home - Is It Safe? (Cybersecurity Roadmap Webinar Cuts)

It is no secret that cybersecurity has grown in importance, especially in a work-from-home world. During this webinar, we review several important security solutions and hires to add to your 2021 roadmap, as well as tips on how to defend the need for them in front of senior management or the board.

How to Stop Insider Data Theft And Protect Privileged Access Management (PAM) Using SIEM?

In this video, we will demonstrate how LogSentinel SIEM is the perfect solution for monitoring and identifying when a privileged user attempts to modify data which would impact the trustworthiness of the information. LogSentinel's #SIEM software will alert you in real-time for any changes made by privileged users.

What are the SIEM Pitfalls and how to avoid them? (SIEM: Benefits and Pitfalls Webinar cuts)

Security Information and Event Management (SIEM) - What is it, why it matters for security and why do we need it? How simple logs can be turned into actionable insights? In this webinar we take a closer look at when is a #SIEM needed, what are SIEMs missing and when do they fail to provide value. We review concepts like alert fatigue, threat intelligence, audit log integrity, log privacy, and more.

What is a SIEM Software? (SIEM: Benefits and Pitfalls Webinar cuts)

Security Information and Event Management (SIEM) - What is it, why it matters for security and why do we need it? How simple logs can be turned into actionable insights? In this webinar we take a closer look at when is a #SIEM​ needed, what are SIEMs missing and when do they fail to provide value. We review concepts like alert fatigue, threat intelligence, audit log integrity, log privacy, and more.

Why is SIEM Important? (SIEM: Benefits and Pitfalls Webinar cuts)

Security Information and Event Management (SIEM) - What is it, why it matters for security and why do we need it? How simple logs can be turned into actionable insights? In this webinar we take a closer look at when is a #SIEM​ needed, what are SIEMs missing and when do they fail to provide value. We review concepts like alert fatigue, threat intelligence, audit log integrity, log privacy, and more.