Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

ITSM Walkthrough - ServiceNow Integration - Tanium Tech Talks #86

See how to configure the Tanium integration for powering the ServiceNow service desk experience with real-time visibility and control on today's Tanium Tech Talk. Watch the guided setup, take note of implementation considerations, plan for user permissions, and do more with the info in this video. VIDEOS IN THIS SERIES CHAPTERS.

Navigating Conceptual Challenges: Insights from Actuarial Experts in Developing FAIR

Delve into the journey of overcoming conceptual challenges in the development of FAIR (Factor Analysis of Information Risk) in this enlightening video. Join as the creator shares personal insights into grappling with quantitative limitations and navigating the complexities of risk assessment. Discover how invaluable support from seasoned executives in actuarial departments provided clarity and assurance amidst uncertainties. Gain valuable perspectives on tackling subjectivity, measurements, and more from experienced professionals.

Unlocking Insights with AI: Introducing Data Explorer by Brivo

Welcome to the future of data analysis! 🌟 In this video, we're diving deep into Brivo's latest innovation - the Data Explorer, an AI-powered tool designed to revolutionize the way we approach data analysis. With the power of artificial intelligence, Data Explorer simplifies complex data sets, allowing you to uncover insights with minimal effort. 🧠💡

Mitigate Upstream Risk in your Software with Black Duck Supply Chain Edition | Synopsys

In this video, we introduce the new Black Duck Supply Chain Edition, which provides a full range of supply chain security capabilities to teams responsible for building secure, compliant applications. With third-party SBOM import and analysis, malware detection, and export options in SPDX or CycloneDX formats, teams can establish complete supply chain visibility, identify and mitigate risk, and align with customer and industry requirements.

Applying Physics to Cybersecurity: The Journey of Control Factoring | Razorthorn Security

Embark on a journey into the innovative realm of control factoring in cybersecurity in this captivating video. Explore the inspiration behind this approach, rooted in the principles of physics and physical environments. Join the creator as they draw parallels between rating scales for tornado strength and structural requirements, pondering the applicability of such concepts in the cybersecurity domain. Delve into the challenges of translating physical forces into abstract measurements and discover the complexities inherent in this endeavor.