Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

The Cycle: Global Threat Dynamics

On this inaugural episode of The Cycle, Bob Gourley, Co-Founder and CTO of OODA Loop, speaks on the current global threat landscape - demonstrating both the risks and opportunities for businesses. In addition to the strategic actions business can take to mitigate risks through automation, decision making and more - he dives deep into the geopolitical realities currently being faced and provides actionable recommendations for decision makers.

Pyrsia - Securing your OSS Supply Chain

With OSS, not knowing where all your software comes from means hard-to-spot risks to the integrity of your services. Without constant identity checks and safety protocols for keys and secrets, open-source dependencies can open the door to breaches, exploits, and supply chain attacks. Enter Pyrsia -- your torch that lights up the open-source supply chain!

Stranger Danger: Your JavaScript Attack Surface Just Got Bigger

Building JavaScript applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome - you're a cloud native application developer! As developers, our responsibility has broadened, and more software means more software security concerns for us to address.

geeks+gurus: SOAR - No-code vs. zero-dev security automation

In this session, Enrico Benzoni interviews Dario Forte, Michele Zambelli and Andrea Fumagalli, to discuss the role of integration in SOC automation, the difference between no-code and zero-dev automation and the importance of the human factor because the quickest response to incidents is not always the right one.

How MSSPs can overcome challenging and uncertain economic times

Running an MSSP is no easy task. In this roundtable discussion, we are going to be exploring how MSSPs can thrive in these uncertain economic times. Security will continue to grow despite the economic conditions but client companies are going to become more price sensitive and this is going to impact MSSPs that compete on margin.

Installing Keeper Connection Manager

Keeper Connection Manager can be installed using one of three methods: An automated Docker Install, a Docker Compose Install, and Advanced Linux Install. The automated Docker Install is the recommended method of installation and the one that will be covered in this video. For the Auto Docker Install method, we support any version of Linux. A couple notes before starting the install.