Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Export Office 365 Security Baseline Report in Octiga for Client

Baseline reports for Office 365 tenants are essential to infer trends based on historical data to enhance client security AND provide proof of compliance. Manage client relationships by reporting them rapidly through targeted baseline security reports, tenant-wide or group-wide, generated in a single click!

Investigate Office 365 Security and Compliance Alerts in Octiga

Investigate possible Office 365 security and compliance alerts across all tenants systematically. Identify suspicious logins, external breaches, faulty inbox rules etc., and drill down into details like risk score, severity, country of the breach, connection type, & user ID, user type, to prioritise in-app remediation in clicks.

Chatbots - Intro to Torq Webinar

The challenges and workloads facing today’s security teams are not getting easier, but the response methods of security teams are still manual, utilizing a patchwork of security tools that are not connected nor communicating with each other. What if you could utilize your organization’s most common communication tool (i.e. Slack) to bring security communications and operations into every part of your organization?

Governance Test Drive

Ever wanted to try out Egnyte’s security and governance capabilities, in order to protect your company’s sensitive data more effectively? You can with Egnyte’s Governance Test Drive! To access Test Drive, navigate to Settings, Plan Details, and Change plan. Then select Open Secure and Govern Demo. Test Drive allows you to explore connected content sources with standardized data so you can see the impact of issues like Suspicious Logins, Unusual Access, and Probable Ransomware;

CloudCasa - How to Deploy CloudCasa on a Rafay Managed Cluster

With Rafay and CloudCasa, enterprises can manage and protect Kubernetes distributions and immediately gain centralized automation, security, visibility, data protection and governance capabilities for Kubernetes and application lifecycle management – across public clouds such as AWS, Azure and GCP.

A Day In The Life Of A Field CISO - Steve Kinman

CISO Journey What is a like CISO role? what was it like an operational ciso v/s a field ciso? like rght now we are talking only about log4j issues and how it would have been for you. What would have been your strategy? Have you seen other field Cxo’s? What is one Unique thing, you are trying to implement? How different is this role from a regular CISO?

Securing a World of Physically Capable Computers with Bruce Schneier

Computer security is no longer about data; it's about life and property. This change makes an enormous difference, and will shake up our industry in many ways. First, data authentication and integrity will become more important than confidentiality. And second, our largely regulation-free Internet will become a thing of the past.

Continuously Securing Software Supply Chain

Catch this session to see a breakdown of the recent news related to software supply chain security and what you can do to meet new requirements and protect your software from such attacks. With new software supply chain attacks reaching the spotlight at an accelerating pace, security research uncovering novel attack methods and new mandates and guidelines starting to come into effect — it can be hard to stay on top of the latest developments and their implications.