Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Secure Coding Practices to Prevent Vulnerabilities in SDLC

Unlocking the Secrets of building a secure app Under 60 Minutes Build a culture of Secure Programming in your engineering team . With the amount of (attempted) security breaches and high paced sprint cycles, securing your mobile applications from day 1 is a driving force to ship applications at speed.

Ransomware Has Evolved, And So Should Your Company

Ransomware is typically initiated via phishing or social engineering tactics, these attacks often take advantage of human error for the successful delivery of the malware. These criminal organizations are impartial to the size of your organization. They target any company with data, and if you don't pay the ransom, your information could be posted to a public forum or sold on the Dark Web for profit. Most companies unfortunately are forced to pay due to system failure and file corruption.

Create a New Application Profile in the Veracode Platform

In this video, you will learn how to create a new application profile in the Veracode Platform. Users with the Creator or Security Lead role on the Veracode Platform can create application profiles. The application profile describes your application, identifies the policy to evaluate the application with, and provides metadata that enables a thorough analysis of security performance across all the applications in your organization.

Yuba County Survived a Ransomware Attack and Lived to Tell the Tale

The growing threat of ransomware attacks is ubiquitous, which has been further accelerated by the pandemic. In February of 2021, Yuba County was hit by ransomware that infected critical systems. Despite the attacker’s demands for ransom, the county was able to avoid paying the hefty fee and quickly recovered with Rubrik. Listen in on the fireside chat with Paul LaValley, CIO of Yuba County as he shares intimate details of how they survived the attack and lived to tell the tale.

Estée Lauder Uses Rubrik to Manage and Protect Global Data at Scale

Leading house of prestige beauty, Estée Lauder is a collection of over 25 globally renowned beauty brands, each with its own unique set of data and unique challenges. To protect all data at scale while keeping costs low, the beauty company embarked on a digital transformation journey – to break free from legacy data protection and mobilize to the cloud.

Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains

This webinar was hosted by Ignyte Assurance Platform and Federal Publication Seminars on 18 June 2021. The Cybersecurity and Infrastructure Security Agency (CISA), under the Department of Homeland Security, launches a campaign to reduce the risk of ransomware. Following an executive order signed by President Biden on May 12, 2021, which aims to increase cybersecurity defenses and resiliency against nation-state data exfiltration and hold global criminals accountable for ransomware attacks.