Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Detecting Security Threats: How to Set up Alerts and Prevent Threats?

Detecting and preventing security threats is a lot easier than fixing already existing ones. With this in mind, you should set up alerts to detect security threats before they occur and do your best to prevent them from happening. There are many ways to set up security alerts. One way to set up alerts is to use a SIEM system such as LogSentinel SIEM, which will send you an alert if something suspicious happens. This way, for example, if you notice a potential security breach, you can turn off your system network in order to prevent the hacker from accessing your network.

Create a Custom Policy in the Veracode Platform

In this video, you will learn how to create a custom policy in the Veracode Platform. The Veracode Platform enables you to create an application security policy against which you can evaluate and measure your applications. You can create, edit, or delete a policy. You must have the Policy Administrator role to perform policy maintenance activities. Policies can comprise one or more of the following types of requirements for your applications: rules, scan requirements, and remediation grace periods. You define the requirements while creating a new policy.

Splunk Mobile - Backend Summary (in 60s)

Get to know the Secure Gateway Splunk app, which allows you to deploy and manage your fleet of mobile devices at scale. Plus, take a peek behind the scenes to learn how Splunk Secure Gateway facilitates communication between mobile devices and Splunk platform instances using an end-to-end encrypted cloud service called Spacebridge. Finally, get the latest on Spacebridge compliance and data privacy, since Spacebridge has now been certified to meet SOC2, Type 2 and ISO 27001 standards and is HIPAA and PCI-DSS compliant.