Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Preventing Insider Threats in SAP SuccessFactors

In this video, we will show you how Lookout CASB provides you visibility into insider threats and privileged user activities. By using deep application awareness and intelligence, Lookout can detect various activities such as edits, exports, and other activities. We then surface this information in user-friendly and intuitive dashboards.

Get to know: Devo Exchange

The Devo Exchange is a vibrant community-based marketplace full of valuable content that Devo customers can browse, install, and manage with push-button simplicity. Devo Exchange enables you to realize immediate value from your Devo deployment by providing on-demand access to content relevant to your security ecosystem. Devo Exchange reduces the time your team needs to spend creating custom content and accelerates the deployment of impactful use cases.

Random but Memorable - Episode 8.8: Secret Agency Space Nerds with Jason Meller from Kolide

Find out how a researcher uncovered a secret German intelligence agency using an Apple AirTag, and how Ozzy Osbourne's (yes, you read that right) NFT project turned into a scam – all in this episode’s Watchtower Weekly. We also invite Kolide CEO and founder, Jason Meller, to discuss user-first endpoint management, empowering the end-user, and creating a culture of security. Plus, Anna gets revenge in Ridiculous Requirements: Capital City edition! 🏙

Understanding Broken Authentication and Session Management

This video is all about understanding broken authentication and session management. You'll learn the difference between HTTP and HTTPS, what it means to "authenticate" a user, how sessions work, and much more!#brokenauthentication #sessionmanagement Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.

How to Use the Snyk CLI to Fix Vulnerabilities in Your Application: The Big Fix

Brian Vermeer, Developer Advocate at Snyk, demonstrates how you can use the Snyk CLI to fix vulnerabilities in your application. Join us for The Big Fix, an event that brings developers and security practitioners round the world to find and fix vulnerabilities. Let's make the Internet a safer and better place than before!

Identity Access Management (IAM) Automation - Intro to Torq Webinar

Security teams are struggling to keep up with the increasing number of attack surfaces and the demands on remediating those attack surfaces in real-time. Security automation is the key to unlocking your security team’s productive potential, but traditional SOAR platforms (Security Orchestration, Automation, and Response) are complex and can take months of development to implement your first automation response sequence.