Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

PAM: A Modern Approach

This short video explains how to thwart cyberattacks by eliminating privileged accounts using a modern approach to privileged access management. To learn more about managing privileged accounts, visit netwrix.com/pam. Traditionally, businesses have maintained dozens or even hundreds of privileged accounts to support critical IT administration activities. These powerful credentials pose a major security risk because they can be stolen by attackers or misused by their owners, either unintentionally or intentionally.

Lookout ZTNA - Intro to onboarding an application, securing access and protecting sensitive data.

In this Lookout ZTNA demo video, you will see how to onboard an application that is within your corporate network, how to secure access to the application using identity-driven policies and how to apply data protection policies to protect sensitive data.

Remediating Excessive IAM permissions in less than 2 minutes with Sysdig Secure

Over-privileged users in the cloud are everywhere!! Security teams are struggling with getting visibility into who should have access to what or how to enforce least privilege access. How do you manage excessive permissions in the cloud? Let's dig in! Sysdig reduces times to secure identities on the cloud to as little as two minutes.

Streaming Auth0 Logs to Datadog | Sivamuthu Kumar (Computer Enterprises, Inc.)

Are you using Auth0 in your application for user logins? How will you monitor the Auth0 logs and detect user actions that could indicate security concerns? In this session, we will see how Datadog helps you to extend security monitoring by analyzing Auth0 User activities in the logs. And also we will see how to set up threat detection rules to trigger notifications automatically based on them.

Cybersecurity Insights - Fileless Attacks

In just the first half of 2021, script-based fileless malware attacks have already nearly reached their entire 2021 total, which in itself was up 888% from the year prior. These highly evasive threats use living-off-the-land (LotL) techniques to fly in under the radar and sneak past many legacy endpoint protections. In this Cybersecurity Insights, WatchGuard Security Operations Manager Marc Laliberte will discuss what fileless malware is, how it works, how attackers are using it, and what you need to do to keep your systems safe from this massively popular threat.

The rise of fintech: Unravelling the revolution transforming the financial landscape

The fintech world has recently been witnessing massive developments. From digital payment solutions to online banking applications, countries across the world have embraced and switched to these digital alternatives. And the COVID-19 pandemic has only boosted this transition further. What was once a cautious adoption of financial technologies has seen a meteoric rise as consumers, financial institutions, and regulators became more aware of the many benefits fintech has to offer.