Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Seeker IAST helps teams understand the security posture of their applications | Synopsys

In this video, we show how product and security teams can determine the security posture of all applications within their organization. Join us to learn how to view compliance to security standards such as OWASP Top Ten, PCI DSS, and others across the entire application portfolio, drill into project level details, and see insights into endpoint risk coverage.

Combat the Erosion of Trust in Digital Media w/ Jon Geater CPO/CTO at DataTrails

Trust in digital media is consequential — from the practical verification of the source of a news photograph to the less visible web infrastructure that impacts society and economies of scale. In this Community Showcase, we’re focusing on solutions that build transparency into our digital ecosystem. See Jon Geater's demo on maintaining the integrity of data across business and application boundaries with the DataTrails platform.

Code Signing with Azure Key Vault: Create a Key Vault, Generate CSR and Import Certificate

In today’s digital landscape, where data security is paramount, protecting your private keys, generating certificates, and managing secure connections is crucial. Microsoft Azure KeyVault offers a robust and reliable solution for handling these critical security aspects. Follow the Video to Manage your Keys and Code Signing Certificates on Microsoft Azure KeyVault. You can Buy Code Signing Certificates for Azure Key Vault to Digitally Sign your Executables and Packages.

The Hower - Episode 4: Clare Loveridge, Vice President and General Manager, EMEA, at Arctic Wolf.

In this episode, our hosts sit down with Clare Loveridge, Vice President and General Manager, EMEA, at Arctic Wolf. Clare is an internationally focused global leader with more than 20 years experience in sales and channel leadership roles at companies like data domain and Nimble Storage where she's grown businesses across EMEA. Clare was the first person hired in the EMEA region at Arctic Wolf to start the region almost 3 years ago.

SEC Allegations: SolarWinds CISO Aware of Cyber Risks Who Should Fix Vulnerabilities? #podcast

Welcome to our latest video where we unpack the recent SEC allegations surrounding SolarWinds CISO's awareness of cybersecurity risks and vulnerabilities. The SEC claims that despite this awareness, the issues were not adequately addressed. Join us as we delve into the critical question: Is the CISO now responsible for fixing vulnerabilities?

Splunk SOAR Logic Loops Demo

Logic Loops are a feature in Splunk SOAR that allow users to reduce the operational complexity of building and maintaining playbooks that require repeatable looping functionalities without having to write their own custom code. This iterative function allows users to automatically retry playbook actions if they fail, or continue with the rest of the playbook when the action succeeds. This function can be applied to use cases like sandbox engines for malicious URL quarantine and remediation as well as forensic investigation workflows.