Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

RCA Series: Root Cause Analysis Overview

Root cause analysis plays an important role in web applications, IT operations, security, and industrial OT. This video series explains general approaches to root cause analysis and how Elastic accelerates the process with visualizations and dashboards, machine learning to detect anomalies and classify conditions, and interactive tools that empower analysts to drill into additional information that lead to root cause of potential system issues and security incidents.

How do you manage secrets (Credentials) in an organisation - Expert panel

In this video a panel of experts discuss how to create an effective secrets management program and what are the challenges large organisations face when trying to combat security issues like secrets sprawl. The discussion is with between: Mackenzie Jackson from GitGuardian James Governor, Co-founder & Analyst at RedMonk Andrei Predoiu, DevOps Engineer at Bestseller Mike Carey, Senior Product Manager at 1Password.

The 443 Podcast - Episode 246 - Minecraft Mod Malware

This week on the podcast we cover a supply chain attack of sorts against Minecraft gamers. After that, we cover a vulnerability in MOVEit Transfer that threat actors are exploiting in the wild to steal data and deploy ransomware. Finally, we wne with our review of the latest Verizon Data Breach Investigations Report (DBIR).

Unlocking the Power of Open Source SAML SSO with BoxyHQ's Enterprise Single Sign-On Tutorial

In this comprehensive tutorial, we explore the power of BoxyHQ's Open Source SAML/OIDC-based Single Sign-On (SSO) solution, called SAML Jackson. Discover how our enterprise SSO feature leverages the flexibility and security of open-source technology while integrating seamlessly with your existing systems. From implementation to best practices, this video will guide you step-by-step, empowering you to revolutionize user authentication and access management within your organization.

The Global Race for AI Dominance: Challenges, Data, and the Dangers of Falling Behind

Join us as we dive into the intense race for AI dominance and the complex dynamics at play. Without global consensus, some regions have already taken a stance on AI development, while others struggle to catch up. The issue with Europe lies in the lack of cohesive action, allowing others to gain a competitive edge. While the UK government's efforts are commendable, this is a moonshot project that requires collaboration and extensive data.

Infosec Growth in the Tech Industry: AI, Projects, and the Fourth Industrial Revolution

Explore the tech industry's pivotal role in driving growth in the field of information security (infosec). With numerous new projects on the horizon, including the remarkable advancements in AI, the landscape is evolving rapidly. AI, which once seemed distant, is now gaining traction with substantial investments pouring in. Governments, like the UK, are legislating grants and support for AI development, recognizing its potential alongside clean energy solutions.