Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Interest Rates and Tech Projections

Join us as we dive into the multifaceted economic landscape and explore the various factors at play. In this video, we analyze the implications of rising interest rates, which tighten credit and make it more challenging to secure loans or raise capital. On the flip side, higher interest rates entice individuals to invest in less risky ventures, as they can yield attractive returns compared to low-risk investments. This shift has significant ramifications for all calculations and investment decisions.

What you need to know about the new 2023 OWASP API Security Top 10

The 2023 OWASP API Security Top 10 list compiles and explains the most recent and pressing security threats facing today’s complex API ecosystem. As part of the committee that defined this industry-framing list, Salt gives you an insider view into the categories and how those embarking on their API security journey can most effectively address the critical vulnerabilities raised.

Secure Remote Access with Secretless SSH Access

Teleport's Infrastructure Access Platform is a highly adaptable solution that addresses various use cases. It enables secretless SSH access to any internet-connected device, making it ideal for solving compliance requirements and enhancing infrastructure access security. Watch this session as we explore Teleport as a secure secretless solution for accessing remote Linux infrastructure via SSH. In particular, we will focus on its application in providing remote support within client environments, a common need for Managed Service Providers (MSPs).

The future of security is identity and with CyberArk, the future of identity is secure

The future of security is identity, and with CyberArk, the future of identity is secure. Learn how CyberArk helps secure your organization against identity-based cyberattacks, with intelligent privilege controls for all identities – human and machine.

Vulnerabilities: The Gateway to Cloud Breaches

Things move fast in the cloud and cyber attackers are always on the lookout for vulnerabilities that they can exploit to gain access. In this short video, see the challenges faced by security teams in managing the ever growing list of vulnerabilities. Runtime insights provides the intelligence required to shift left - find and prevent vulnerabilities earlier, and shield right - protect what’s running in production.