Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Full VM Recovery: Steps to restore your Virtual Machines completely

Full VM recovery can restore an entire virtual machine (VM) to its original state from a backup. It involves recovering all the VM’s components, including the operating system, applications, configurations, and data. With the Full VM Recovery option, you can restore the backup virtual machine/VM Template data to the same or different VMware host/server exactly in the same state as it was during the backup.

A06 Vulnerable and Outdated Components - OWASP TOP 10

Outdated software components are a hacker's best friend. Learn about the dangers of A06:2021 (formerly known as "Using Components with Known Vulnerabilities") in the OWASP Top 10. This threat just climbed the ranks – let's get you up to speed! In this video, we'll tackle.

AT&T DDoS Defense Portal Email Alert Video

In this video, you'll learn about AT&T DDoS Defense Service Alert Emails. We'll also give you an overview of the investigation process. For any high severity alerts, which are caused by traffic exceeding thresholds in protected zones, the DDoS Defense Service sends an alert email to your contacts. At the same time, a ticket is created for the AT&T Threat Management Team to investigate the alert.

Barracuda's Adam Khan on AI-driven XDR and plugging the security skills gap

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Adam Khan. Adam is a cybersecurity and technology leader with over 25 years of experience working at Fortune 500 companies. He has a proven track record of building and managing global security teams, leading engineering, infrastructure, application, and product, and is currently VP of Global Security Operations at Barracuda.

Perspective-Driven Probability: Simplifying Risk Assessment with FAIR Methodology

Explore the nuanced nature of probability and risk assessment in this insightful video. Join us as we navigate the diverse perspectives that shape individual interpretations of what's probable. Discover how the FAIR (Factor Analysis of Information Risk) methodology provides a structured approach to understanding and communicating risk, making it accessible not only to the creator but to a wider audience. Gain insights into the challenges of assigning probabilities to uncertain events with limited data, and learn how FAIR methodology offers clarity in the face of uncertainty.