Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Riscosity Overview

Riscosity Helps Enterprises understand who are their actual Software Vendors. The revenue generating software powering most enterprises, uses 3rd party computer code - called components - sourced from many different companies. Riscosity builds a real time catalog of all these components, and identifies what data is being exchanged with these vendors and helps secure them and reduces any legal liabilities as a result of failed audits or findings.

CloudCasa Certified OpenShift Operator Installation Demo

CloudCasa now seamlessly integrates with Red Hat OpenShift via a certified CloudCasa operator, enabling the delivery of comprehensive backup and recovery for your Kubernetes configuration and application data. From the console of Red Hat OCP, you can easily deploy CloudCasa to your clusters to provide comprehensive backup and recovery functions.

Detect & Mitigate Your Ransomware Risk with Egnyte

In this video, Egnyte’s Chief Governance Officer Jeff Sizemore & Senior Manager of Governance Marketing Neil Jones discuss recent trends in ransomware detection and how you can mitigate potential attacks. A brief demo is provided at the end, where you will learn how to recover from a ransomware attack. Ransomware attacks continue to proliferate. We want users to understand the current state of ransomware attacks and to be able to prepare for attacks and manage them more effectively.

Introduction to Custom Fields

Use custom dimensions and measures to aggregate column values or filter data. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.

Handling an incident in LimaCharlie: best practices, capabilities, tips & tricks

LimaCharlie benefits security organizations by providing the core technologies required for cybersecurity operations such as EDR, log ingestion, software defined networking and more. It does this with a self-serve, usage-based model. Run your operations through the web application or leverage the API and infrastructure-first approach to integrate at scale. Join us for this webinar to learn the best practices, tips and tricks for handling an incident.