Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Tanium + Microsoft: Real-time, actionable intelligence

In today’s threat landscape, endpoints are the frontline—and attackers are relentless. Discover how Microsoft Security Suite and Tanium combine forces to deliver a unified, AI-powered platform for real-time threat detection, Autonomous Endpoint Management (AEM), and streamlined IT operations. Tanium brings real-time actionable intelligence to the Microsoft Security Suite, so you can make immediate decisions on the current state of your IT landscape.

Tanium Solution Demo: Endpoint Management

The Tanium Endpoint Management solution offers cross-platform lifecycle management from a single console, delivering visibility and control over endpoint assets both on-premises and in the cloud. The solution begins with provisioning new endpoints and continues through the lifecycle of patch management and third-party software deployments, performance monitoring, policy enforcement and issue investigations to give administrators the ability to see, control and remediate in real time.

Making Tanium Your Own - Tanium for Help Desk - Tanium Tech Talks #131

Every Tanium customer wants fast results specific to their environment. This episode brings together all the ingredients necessary for a customized experience, in this case for the service desk, providing massive value in efficiency. Identify your top tickets with scriptable solutions and turn them into packages Identify the data meaningful to you and collect it with custom sensors Build a Single Endpoint View with both data and actions for closing tickets Use RBAC to grant these items to the service desk Winning!

Inside the Early Lessons of DORA Compliance: What Works, What Fails, What's Next?

Six months into DORA — is financial services building real resilience or just ticking boxes? In this episode of Razorwire, host James Rees is joined by Richard Cassidy, Jonathan Care, and first-time guest Romain Deslorieux to dissect how the Digital Operational Resilience Act (DORA) is really playing out in financial services — beyond the policies and into the pressure.

CDNs Won't Save Your APIs: Here's Why You Need to Rethink Security

Content delivery networks (CDNs) are great for performance—but terrible for protecting APIs. Attackers can poison the cache or route around security altogether when APIs are misconfigured. In this clip, Jeremy Dodson explains why relying on CDNs can expose critical business data.

What are the best Cybersecurity practices for Remote Work?

Are you working remotely and worried about cybersecurity threats? Did you know that the average cost of a data breach is $4.35 million? Over 90% of data breaches are caused by human error, emphasizing the importance of cybersecurity awareness. That’s a huge financial impact—Learn how to prevent it! Discover the top cybersecurity practices to keep your data safe while working from home!