Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Transform your Data Center with Confidence | Joint Webinar by CloudFabrix and Verge.io

Verge.io is partnering with CloudFabrix, a leader in artificial intelligence for IT operations, to chat about why software-defined everything is the way to go. This is a great opportunity to learn how to transform your current data center operations using the latest technology and intelligence. Here’s what we’ll cover: – How artificial intelligence and data center virtualization operating systems work together to change the thinking around traditional data centers.

SQL Injection explained in 1 minute

SQL injection, also known as SQLi, is one of the most dangerous vulnerabilities for online applications. It's a common method used by attackers to manipulate and access database information that would otherwise not be displayed or provided to the website user. In this video, you'll learn what SQL injection is and why you should be aware of it.

Cyber Defenders Defending Critical Infrastructure Interview with Aaron Cockerill

Nextgov interview with Aaron Cockerill for a conversation shaped by today’s topics of critical infrastructure and cybersecurity threats. Discussing everything from phishing attacks to hybrid-remote work best practices, this interview offers insight into how Lookout can help both public and private organizations address digital threat prevention, providing relevant context to the cybersecurity world going forward.

SANSFire: An Alert Has Fired. Now what?

While the security industry spends a lot of time and energy getting more and/or better alerts, comparatively little investment has gone into helping analysts operationalize and contextualize those alerts. This webcast will discuss how a solid foundation of network telemetry can enable not only high-velocity, high-confidence processing of alerts of all stripes, but also a host of other critical security applications, from fundamentals like asset management to advanced techniques like proactive threat hunting. Real-world examples and code will be used throughout the talk, along with practical considerations for operating in an enterprise environment.