Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Secure Remote Access with Secretless SSH Access

Teleport's Infrastructure Access Platform is a highly adaptable solution that addresses various use cases. It enables secretless SSH access to any internet-connected device, making it ideal for solving compliance requirements and enhancing infrastructure access security. Watch this session as we explore Teleport as a secure secretless solution for accessing remote Linux infrastructure via SSH. In particular, we will focus on its application in providing remote support within client environments, a common need for Managed Service Providers (MSPs).

Interest Rates and Tech Projections

Join us as we dive into the multifaceted economic landscape and explore the various factors at play. In this video, we analyze the implications of rising interest rates, which tighten credit and make it more challenging to secure loans or raise capital. On the flip side, higher interest rates entice individuals to invest in less risky ventures, as they can yield attractive returns compared to low-risk investments. This shift has significant ramifications for all calculations and investment decisions.

The CyberShield Event | Safeguarding The Digital Landscape

Obrela's inaugural event in KSA about Cybersecurity. A line up of international speakers and honoured guest were present to discuss intriguing topics. Our CEO, George Patsis, commenced the presentations by addressing the prevailing challenges in CyberDefense and highlighting the emergence of the new Cyber Risk Landscape. Furthermore, we delved into an in-depth discussion regarding the significance of adhering to Cyber Assurance standards, the advancements in Modern Threat Intelligence Centers, the utilization of AI to strengthen CyberDefense capabilities, and the intricate relationship between Cyber Criminals and Nations.

Challenges in Cyber Insurance

Join us as we explore the intricacies surrounding cyber insurance in the face of potential attacks from various malicious actors, including state-sponsored hackers. We delve into recent developments, such as Lloyds of London's revised terms, sparked by events like the staggering $1.4 billion loss suffered by Merck. The question arises: How can insurers distinguish state-sponsored attacks from other cyber threats? We analyze the implications of blanket clauses that may deter individuals and organizations from purchasing insurance, given the uncertainty surrounding their coverage.

How to work with Jit's backlog

Welcome to Jit! In this video, we'll introduce the "Backlog" page. This page displays all the vulnerabilities that Jit has found upon onboarding and forward. To open a finding in the Backlog window, simply click on it. On the right, you can see details of the finding, such as where it is located in GitHub and which tool was used to find it. If you want to ignore multiple findings, no problem. You can easily change their status. You can filter the backlog by choosing a specific tool from the drop-down menu. In this example, we are filtering by "KICS", one of our cloud security tools.