Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Falcon Cloud Security Asset Graph: Demo Drill Down

Gain the edge in the race against adversaries by leveraging unified visibility across your attack surface—from endpoint to cloud. See how Falcon Cloud Security's Asset Graph uncovers vulnerabilities, highlights misconfigurations, and automatically maps the complete attack trajectory, empowering you to respond faster and mitigate threats effectively.

Perimeter Security vs Cyber Resilience: CSPM vs DSPM

In this episode of Into the Breach, James Purvis is joined by Noam Perel to explore the key differences between CSPM (Cloud Security Posture Management) and DSPM (Data Security Posture Management). They dive into how these tools address different problems, their unique approaches to security, and why organizations benefit from leveraging both. Discover how DSPM’s data-centric approach complements CSPM’s infrastructure focus, the distinct personas driving each, and how together they provide a stronger, more resilient security posture.

Overview of Arctic Wolf Managed Security Awareness

In this overview of Arctic Wolf Managed Security Awareness, we take a look at the importance of addressing human risk. Find out how this program uses micro learning sessions to deliver frequent, easy to consume content that builds a strong security culture. Learn more how Arctic Wolf Managed Security Awareness ends human risk by delivering 100% relevant microlearning content.

Managing identities in a growing organization: Lessons from SECURA Insurance

Joe Albers, Senior Information Security Engineer at SECURA Insurance, shares how effective identity management is crucial for compliance and security in the insurance sector. In this video, Albers discusses the challenges SECURA Insurance faced in managing identities as they grew from 600 to 1,100 employees. Timely deprovisioning and secure access to critical applications was a top priority during the transition from manual processes to automation, which the company achieved seamlessly with One Identity Manager.

Track and manage open source risk across your application portfolio with Black Duck SCA | Black Duck

Learn how your security teams can take a proactive approach to managing open-source risk using Black Duck Software Composition Analysis (SCA). Join us as we explore the process of analyzing scan results, addressing new CVEs, and prioritizing remediation efforts. Key Highlights: Discover how Black Duck SCA empowers teams to surface, understand, and prioritize findings efficiently, ensuring software security and compliance.

What are the business advantages of being SWIFT CSP compliant?

Cyberattacks targeting financial institutions cost the industry over $18 billion annually! Implementing SWIFT CSP compliance isn’t just about meeting regulatory requirements—it’s a game-changer for your business! In this video, you’ll discover: 1) How SWIFT CSP compliance enhances trust and credibility with clients 2) Improved Incident response & business impact 3) How SWIFT CSP ensures compliance and mitigates risks.