Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Estée Lauder Uses Rubrik to Manage and Protect Global Data at Scale

Leading house of prestige beauty, Estée Lauder is a collection of over 25 globally renowned beauty brands, each with its own unique set of data and unique challenges. To protect all data at scale while keeping costs low, the beauty company embarked on a digital transformation journey – to break free from legacy data protection and mobilize to the cloud.

Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains

This webinar was hosted by Ignyte Assurance Platform and Federal Publication Seminars on 18 June 2021. The Cybersecurity and Infrastructure Security Agency (CISA), under the Department of Homeland Security, launches a campaign to reduce the risk of ransomware. Following an executive order signed by President Biden on May 12, 2021, which aims to increase cybersecurity defenses and resiliency against nation-state data exfiltration and hold global criminals accountable for ransomware attacks.

DevSecOps is a practice. Make it visible

Security should be embedded in DevOps by default, but for many organizations, it is not. Enter “DevSecOps”. What is DevSecOps? It is a practice to build more secure applications, secure the software factory, and secure cloud workloads. Because it is a practice it needs to be visible. In this session hear about the ways tech-enabled enterprises approach a DevSecOps practice, how they make it visible, and how Splunk + JFrog can accelerate your journey.

Spotlight on Technology - Encryption

In our new series, Spotlight on Technology, we invite experts from different areas of cyber security to talk to us about their specialisms. First up, we take a look at encryption with James Rees MD of Razorthorn, a cyber security consultancy & Scott Glazer from Atakama, New York based multifactor encryption software specialists. 80% of companies hit by ransomware are hit twice in a short space of time – 45% of the time by the same attacker as the initial breach. We need to take a new approach to defend against this modern day threat.

Securing DevOps : Security in the Cloud

Key Topics surface possible for a startup, to focus on their product and leave complex infrastructure security and cloud security problems for later on.
  • The need to start segmenting permissions when there are too many people in a team is a natural, and getting into the cloud services and cloud security business knowing that rearchitecting regularly will be needed is healthy.
  • The Power of Security Automation

    A more diversified workforce only reinforces the importance of vigilance against cyberthreats. And though you’re likely offering your customers the latest and greatest security solutions, the human element is hard to ignore. Thankfully, security automation lowers the risk of human error and raises your security profile.