Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

How to Secure Your Supply Chain

We've talked about supply chain security before but it's a trend that doesn't appear to be going away - indeed, the number of attacks on service providers only seems to be increasing. Outsourcing is always a strategic risk for any business, but knowing that these attacks are getting more prevalent, what do you need to be doing to make sure your supply chain in secure? We talk about what needs considering to ensure your data isn't compromised by third party security issues. (Start at 7 mins 33 secs to skip to the 'how to').

Egnyte Links for Procore Project Links Quick Tip

In this video, learn how to streamline access to your project files by using Egnyte links as Procore project links. Save time and eliminate duplicate files in Procore by using Egnyte links for Procore project links. Ensure your team has easy access to their project files in Procore by using Egnyte links as project links.

AppSec Decoded: New executive order changes dynamic of software security standards | Synopsys

In this episode of AppSec Decoded, Tim Mackey, principal security strategist at Synopsys Cybersecurity Research Center (CyRC), discusses how the new executive order from the Biden administration will change the way government entities or the heads of those entities operate to adjust to the surge of security threats.

Splunk SOAR Feature Video: Custom Functions

Splunk SOAR’s custom functions allow shareable custom code across playbooks and the introduction of complex data objects into the playbook execution path. These aren’t just out-of the-box playbooks, but out-of-the-box custom blocks that save you time and effort. This allows for centralized code management and version control of custom functions providing the building blocks for scaling your automation, even to those without coding capabilities.

Splunk SOAR Feature Video: Contextual Action Launch

Splunk SOAR apps have a parameter for action inputs and outputs called "contains". These are used to enable contextual actions in the Splunk SOAR user interface. A common example is the contains type "ip". This is a powerful feature that the platform provides, as it allows the user to chain the output of one action as input to another.

Splunk SOAR Feature Video: Configure Third Party Tools

To get started in Splunk SOAR, you will need to configure an asset. Assets are the security and infrastructure assets that you integrate with the Splunk SOAR platform, like firewalls and endpoint products. Splunk SOAR connects to these assets through apps. Apps extend the platform by integrating third-party security products and tools.