Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Under the Wing: Automating Workflows with Falcon Fusion

76% of organizations report not having enough qualified security specialists. 80% of them report alert fatigue — with analysts scrambling to respond to multiplying alerts and few to no processes to streamline investigation and response. Join us in the next episode to learn how teams are using tools like Falcon Fusion to automate workflows, streamline operations and keep their team moving fast.

The Importance of People in Cyber Security: A Process and Technology Perspective

In this video, we delve into the crucial role of people in cyber security. Following the people-process-technology approach, we discuss why having the right individuals in place within an organization is key. Learn how the skills of these individuals define your processes and how technology can aid in augmenting your efforts. Discover why the people element should always be the focus and why it's not always easy to find the right individuals when you need them. Join us in exploring the importance of people in cyber security.

Veracode Container Security

Introducing Veracode Container Security - this new tool is now seamlessly integrated with the Continuous Software Security Platform. Veracode Container Security is a command line interface (CLI) tool that integrates into your pipeline with ease. This empowers developers to secure containers earlier in the software development life cycle, ensuring containers are built and deployed securely.

Dev-First Prevention Strategies

Security and engineering teams often fail to find a balance between meeting the necessary security objectives for their organization and ensuring maximum velocity. While security teams view the process of blocking new critical severity vulnerabilities as a basic security best practice, engineering teams often push back out of fear that it will create too much friction for their developers. This dynamic is often based on prior experience with legacy security systems that focus almost solely on the needs of security and fail to support developers in this process.