Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Use the Jenkins Credentials Binding Plugin to Protect Your Veracode Credentials

In this video, you will learn how to: You can use the Jenkins Credentials Binding Plugin to hide your Veracode API credentials from the Jenkins interface and logs. You use the plugin to associate, or bind, your Veracode API credentials to environment variables and save them to the Jenkins credentials store. During a build, Jenkins uses the environment variables to secretly access your credentials. The Jenkins interface and logs only show the bound environment variables.

AppSec Decoded: The state of mobile application security during the pandemic | Synopsys

In this episode of AppSec Decoded, we spoke with Tim Mackey, principal security strategist at the Synopsys Cybersecurity Research Center (CyRC), to learn about the state of mobile application security during the pandemic. The information is based on a new Synopsys report, "Peril in a Pandemic: The State of Mobile Application Security."

Protecting and Managing Microsoft 365 Data

Microsoft 365 provides tools to assist with compliance, but they don’t provide native backup and recovery - they recommend customers backup their data with third-party applications. Rubrik’s SaaS-based approach to data protection for Microsoft 365 ensures critical data is secured, easily discoverable, and always accessible.

Enable Your Journey to the Cloud

Today, data is growing faster than ever, and so should your business plans! Learn about the benefits of cloud storage and how with Rubrik you can seamlessly manage and protect your data while accelerating your cloud adoption, simplifying archival, streamlining app migration, and unifying data protection across multi-cloud and hybrid migration. Rubrik will help your enterprise drive resiliency at the point of data and give back control and visibility.

Automate and Integrate with Rubrik APIs

Managing a large distributed environment can get busy. Rubrik has created a comprehensive API that can be integrated with any other system or workflow to ensure consistency and save you time. This allows you the flexibility to leverage pre-made integrations or custom-build your own. APIs can be used to avoid long wait times and ticket overflow, and empower users to assign SLAs, perform restores or monitor backups.

JFrog And Red Hat DevSecOps Security Series

Accurately detecting and mitigating security vulnerabilities is critical for any enterprise. JFrog’s ongoing collaboration with Red Hat provides the DevOps community with enterprise-grade DevSecOps capabilities, enabling you to deliver high-quality, and more secure software, anywhere. As part of the Red Hat DevSecOps Security Series, Join us on July 1st for JFrog & Red Hat’s perspective on application analysis and how JFrog’s recently achieved Vulnerability Scanner Certification helps identify vulnerabilities in applications, images and configurations early in your lifecycle.