Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Splunk SOAR Feature Video: Playbooks

Splunk SOAR playbooks automate security and IT actions at machine speed. Playbooks execute a sequence of actions across your tools in seconds, vs hours or more if you perform them manually. Splunk SOAR comes with 100 pre-made playbooks out of the box, so you can start automating security tasks right away. Splunk SOAR’s visual playbook editor makes it easier than ever to create, edit, implement and scale automated playbooks to help your business eliminate security analyst grunt work. *Users can build and edit playbooks in the original horizontal visual playbook editor, or the vertical visual playbook editor introduced in August 2021.

Spotlight on Technology: Privileged Access Management

In the second of our new series, Spotlight on Technology, we take a look at privileged access management with James Rees MD of Razorthorn cyber security consultancy, & David Higgins, EMEA Technical Director of CyberArk, leaders in identity security and access management. Accounts with privileged access are gold dust for malicious actors and gaining access to these, and the sensitive data these accounts have access to, can cause some huge and costly problems for the targeted organisation.

CISO Insider - S2E6 - Data is trust with Emilio Escobar

Datadog CISO Emilio Escobar joins Chris Martinez on CISO Insider for a discussion on data security approaches for today’s cloud-first world. Emilio shares how he sees infosec: creating security responses based on people and teams over brute force blocking of apps and systems. This approach allows Datadog to defeat the enemy of complexity in IT service quality, and helps build a more inclusive culture at the company. By seeing data as trust, Emilio can influence his teams to find better solutions to data security problems and learn from typical pain points. We get into all this and a lot more in the chat today.

Bughunting your React web applications using DevTools

What if I told you that simply using Redux DevTools we will be able to bypass security gates that you didn't realize you have open? Building modern web applications still leaves out many room for mistakes, and even using frameworks like React, requires adhering to many security practices, in order to get things right for security. Otherwise, you risk exposing your web applications to vulnerabilities that others can exploit.

Hello CISO - Episode 1 (Part 1): The Downfall of On-Premise Security

In the beginning, there was on-premise. Then things got complicated. Hello CISO is a new series aimed at Chief Information Security Officers, IT security teams, and all other members of an organization responsible for maintaining the safety and integrity of the business and its operations. "The responsibilities of the modern CISO are expanding as digital infrastructure grows more complex. It’s no longer feasible to protect against every single threat, so you have to think more strategically. We need to work smarter, not harder – and that’s what I want to explore in this series."