Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Coffee Talk with SURGe: DOJ China Espionage, Drizly Complaint, Text4Shell, U.S. Midterm Elections

Grab a cup of coffee and join Ryan Kovar, Mick Baccio, and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Mick and Ryan competed in a 60 second charity challenge to share their take on the issue of victim-blaming for phishing attacks. The episode ends with a deep dive on cyber threats ahead of the U.S. midterm elections on Nov. 8.

Secure access to all apps powered by a single Atmos policy

Unlike other Security Service Edge (SSE) platforms, Atmos provides a single interface to manage All your policies, apps, devices, users, data, and more. Atmos logical policy creation helps IT admins define both broad and granular access permissions in minutes. The end result is easy policy creation and management without the headache or complexity.

Take M&A integration from months to minutes with Atmos Multi-IDP

Whether you’re helping onboard newly acquired users, or activating third-party contractors, its important for productivity that users are enabled with same day access to SaaS, Web, and private applications needed for work. With Atmos Multi-IDP support, Axis’ Security Service Edge (SSE) platform uses existing identity services paired with zero trust policies to automatically determine which users should get access to sensitive data while delivering a seamless experience.

Cybersecurity Insights: Secure Your Clients Against Ransomware

Ransomware attacks are dramatically increasing in number and frequency year over year, with high-impact, headline-making incidents continuously growing in volume and scope. Ransomware gangs are also looking at their primary victim’s business partners to pressure them into paying a ransom to prevent data leakages or business disruptions caused by the attack.

Sysdig Talks 2022 Threat Landscape (Live)

Is your organization ready to pay an additional $430,000 cloud bill as a result of cryptojacking? The Sysdig Threat Research Team recently released the 2022 Sysdig Cloud-Native Threat Report, which details the cost of cryptojacking, the reality of software supply chain risks, and how hacktivism has become a prominent feature in cyber warfare. While the motives of hackers have not changed, they have adjusted their attack patterns and tactics to penetrate cloud environments more effectively. Fortify your cloud by understanding the current threat landscape and identifying defense strategies.