Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Closing the Loop on Automation, Itential and Forward Networks

Combining the power of Forward Networks' Digital Twin with Itential's low-code network automation platform enables network operations teams to take full advantage of automated network configuration without the risk of unintended consequences from change windows.

AWS Fargate runtime security - Implementing File Integrity Monitoring with Sysdig

Thanks to serverless you can focus on your apps, instead of your infrastructure. Take AWS Fargate as an example. A service where you can deploy containers as Tasks, without worrying what physical machine they run on. However, without access to the host How can you detect suspicious activity? Like, file changes on your Fargate tasks? Sysdig provides runtime detection and response to secure Fargate serverless containers.

The Interview Series - Corey Williams, CyberArk

Grab a coffee and join us for a chat with CyberArk’s Head of Identity Security Marketing, Corey Williams. If you don’t know them already, CyberArk are leaders in identity security and access management. We talk about how the pandemic has changed the way businesses can (and should!) adopt technology to improve business processes and the challenges that come with this, including how to tackle a lack of understanding and improving communication within your organisation.

Create Security Labs Users from the Veracode Platform

In this video, you will learn how to create Security Lab users from the Veracode Platform. Veracode Security Labs provides interactive training labs that give developers practical security knowledge. Security Labs teaches security and application security (AppSec) skills through hands-on experience. The lab-based approach to developer enablement can improve the time it takes to resolve findings and help developers avoid introducing flaws into the code.