Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

#DidYouKnow? Rogue Devices are a Threat to Your Network

#DidYouKnow? Rogue devices are a serious threat to your network! It doesn't matter if it's an unauthorized game console an employee added, or hacker plugging into an exposed ethernet port. Knowing what you have and what you should have helps you ensure you take devices off your network that shouldn't be there. #NAC #cybersecurity #rogue #networksecurity

Filter and prioritize IAST vulnerability findings using Project Views in Seeker | Synopsys

In this video, Product Manager, Scott Tolley shows how setting up the new Project Views feature in Seeker can help developers focus their time and attention on the most relevant vulnerability findings in running applications– without hiding the full details from security team. This new feature lets security and development teams...

ITAM & CMDB - EXPRESS - ServiceNow Integration - Tanium Tech Talks #85

See how Tanium can feed your ServiceNow CMDB with fresh asset inventory on today's Tanium Tech Talk. We're going to start at the beginning with asset data: hardware, software, usage, and more. Many Tanium customers update their ServiceNow CMDB multiple times per day to enjoy the benefits of accurate and timely asset data.

Becoming A Secure API First Company

Join Nick Rago (VP of Product Strategy at Salt Security) and Claudio Acquaviva (Software Architect of Kong Inc.) in this informative webinar (live April 11). They discuss what being API-first really means, the essentials to success, and walkthrough the lifecycle of an API from design to deployment and how combining Salt Security with Kong through that API lifecycle can help provide a risk-free API-first journey.

(Re)Discover the Hidden Value of Single Sign-On

There is no better time to (re)discover the hidden value of single sign-on as part of your journey to zero trust. Single sign-on (SSO) combines simplicity with security by removing friction for users to access applications and reducing the administrative overhead and risks for IT associated to password management.

LimaCharlie's SecOps Cloud Platform - Security Beyond Limits

Your reality is frustrating. It's diminishing your potential. You're going through the same old motions, trying to bridge the same old gaps. Because it's always been just the way things are. You’re walled in by a lack of creativity. Caged by a reality where traditional tools stifle the freedom to excel. What if we could smash through the walls of our broken reality? Reach out and grasp a whole new way of managing SecOps. With better tools, security, and technology.

Navigating the SecOps Cloud Platform Revolution for Enterprise SOCs

In a world where digital transformation has become the norm, cybersecurity professionals face unprecedented challenges. The traditional approach of managing dozens of disparate point solutions and siloed security tools, while attempting to control costs, is no longer sufficient. It's time to embrace a new era of cybersecurity in the SecOps Cloud Platform – one that treats cybersecurity as a set of capabilities much like how cloud providers did for IT. We challenge you to question the status quo and to open your mind a new way of thinking about security operations.

Unlocking the Future: Seamless Security & Smart Building Management

Dive into the world of frictionless entry and smart building management with us at Brivo! In this video, we explore how cutting-edge technology can transform your experience with seamless access, enhanced security, and optimized space utilization. 🔄💡 Discover the power of data in creating safer, more efficient environments and see how Brivo is leading the charge in innovative security solutions. 📊🔑

Graylog V6 and SOC Prime: Cyber Defense with MITRE Framework Webinar

Insights from Graylog and SOC Prime Join us for an exclusive session where we unveil the integrations between Graylog, a comprehensive log management solution, and SIEM, and SOC Prime’s Platform for collective cyber defense. Discover how integrating these solutions transforms your approach to security, providing a robust foundation for crisis management and resilience against cyber threats.

Cloud Unfiltered with Matt Johnson - Cloud Native Security at KubeCon 2024

In this special edition of Cloud Unfiltered, recorded live from KubeCon Paris, host Michael Chenetz sits down with Matt Johnson, Cloud Security Field CTO at Palo Alto Networks, to dive deep into the evolving landscape of cloud native security. As organizations continue to embrace cloud technologies and Kubernetes, the complexity of securing these environments has never been more challenging. Matt shares his insights on the current state of cloud security, the importance of a holistic approach to securing applications across multiple layers, and the role of developers in the security ecosystem.