Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Governance Test Drive

Ever wanted to try out Egnyte’s security and governance capabilities, in order to protect your company’s sensitive data more effectively? You can with Egnyte’s Governance Test Drive! To access Test Drive, navigate to Settings, Plan Details, and Change plan. Then select Open Secure and Govern Demo. Test Drive allows you to explore connected content sources with standardized data so you can see the impact of issues like Suspicious Logins, Unusual Access, and Probable Ransomware;

CloudCasa - How to Deploy CloudCasa on a Rafay Managed Cluster

With Rafay and CloudCasa, enterprises can manage and protect Kubernetes distributions and immediately gain centralized automation, security, visibility, data protection and governance capabilities for Kubernetes and application lifecycle management – across public clouds such as AWS, Azure and GCP.

A Day In The Life Of A Field CISO - Steve Kinman

CISO Journey What is a like CISO role? what was it like an operational ciso v/s a field ciso? like rght now we are talking only about log4j issues and how it would have been for you. What would have been your strategy? Have you seen other field Cxo’s? What is one Unique thing, you are trying to implement? How different is this role from a regular CISO?

Securing a World of Physically Capable Computers with Bruce Schneier

Computer security is no longer about data; it's about life and property. This change makes an enormous difference, and will shake up our industry in many ways. First, data authentication and integrity will become more important than confidentiality. And second, our largely regulation-free Internet will become a thing of the past.

Continuously Securing Software Supply Chain

Catch this session to see a breakdown of the recent news related to software supply chain security and what you can do to meet new requirements and protect your software from such attacks. With new software supply chain attacks reaching the spotlight at an accelerating pace, security research uncovering novel attack methods and new mandates and guidelines starting to come into effect — it can be hard to stay on top of the latest developments and their implications.

No BS security: detect and automate with LimaCharlie & Tines

Why is there so much BS involved in the building and selling of security software? The security stack of the future – and of today, in the best companies – is composed of tools that focus on doing one thing extremely well, with transparent value and pricing, packaged in a product that the team will actually enjoy using. Join Eoin & Maxime, the founders of Tines and LimaCharlie, as we explore why "No BS" is the future of security, and put our own products to the test: building an end-to-end sophisticated detection and response flow using the free, ungated versions of our products.

5 Ways to Protect Your Website from Bot Attacks

Web scraping is the process of using tools such as crawlers and scraping bots to extract invaluable data and content from websites, read parameter values, perform reverse engineering, assess navigable paths, and so on. Global e-commerce businesses saw a drop of 2% in revenues, totaling 70 billion dollars, due to web scraping. This highlights the importance of effective web scraping protection.

Securing the Digital Supply Chain - Why are Investors interested in the digital supply chain

In this session for the Securing the Digital Supply Chain we talk to two very well known investors from Silicon Valley - Mahendra Ramsinghani (Secure Octane) and Cherian Mathew (Firebolt VC). We learn what drives the investment thought process for these two successful VCs and also hear what their perspectives are on cybersecurity, areas of interest, how to think about the market. Especially interesting are the thoughts on "Who gets affected" from a Digital Supply Chain perspective.