Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Create and Run an Unauthenticated Dynamic Analysis

In this video, you will learn how to create, configure, and schedule an unauthenticated Dynamic Analysis. An unauthenticated Dynamic Analysis scan is appropriate when the site you are scanning does not require a login. Veracode Dynamic Analysis also supports the scanning of websites that require authentication, such as such as login via a webform, browser based, or NTLM.

Sequoia Capital Global Equities shares how Netskope Proved It

Patrick Fu, managing partner at Sequoia Capital Global Equities, discusses how Netskope proved it has become the unrivaled leader driving innovation across cloud, data, and network security and why after extensive analysis of dozens of security vendors, Sequoia decided to invest in Netskope.

Coralogix - Panel Discussion: Elasticsearch is Not Open Source Anymore

Does SSPL license endanger your intellectual property? As of January 2021, Elasticsearch is no longer open source. From version 7.11 and onwards, all ELK products (Elastic, Logstash, Kibana) will be registered under the new SSPL license created by Mongo and now adopted by Elastic. In this panel, our IP expert lawyer discusses the new license and helps explain whether it impacts your business or puts it at risk.

Forward Fix: Use Case for Network Query Engine Library

Technical Solutions Architect, Kevin Kuhls demonstrates a use case for Forward Enterprise's Network Query Engine (NQE) Library. Watch as he finds all BGP neighborships that are not in the established state without tediously logging into each router or writing complex scripting. Across all vendors and locations, Forward Enterprise models all the devices and NQE allows you to grab the data you want.

Security Challenges and Opportunities of Remote Work | Kill the VPN |

The COVID-19 pandemic forced many organizations to shift to a remote workforce almost overnight, most of which were not prepared for the sudden change. In their efforts to ensure their employees could remain productive, a number of organizations relaxed their security policies and unwittingly exposed their networks to compromise. As the pandemic continues, security challenges remain, but organizations also now have opportunities to find and fix vulnerabilities and improve their overall security posture, even as their employees eventually migrate back to the office.