Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

What is the SWIFT Customer Security Programme (CSP)?

Are you familiar with the SWIFT Customer Security Programme (CSP) and its significance in safeguarding global financial systems? In this video, we dive into the essentials of SWIFT CSP, an initiative launched in May 2017 to enhance the cybersecurity of financial institutions worldwide. Learn about: Whether you're a banking professional, a cybersecurity enthusiast, or simply curious about financial security frameworks, this video offers valuable insights into maintaining the integrity of financial transactions.

Track and manage open source risk across your application portfolio with Black Duck SCA | Black Duck

Learn how your security teams can take a proactive approach to managing open-source risk using Black Duck Software Composition Analysis (SCA). Join us as we explore the process of analyzing scan results, addressing new CVEs, and prioritizing remediation efforts. Key Highlights: Discover how Black Duck SCA empowers teams to surface, understand, and prioritize findings efficiently, ensuring software security and compliance.

DORA Compliance Essentials : A Guide for CISOs and Compliance Officers

The Digital Operational Resilience Act (DORA) is set to go live on January 17, 2025, marking a pivotal shift in cybersecurity compliance for financial entities across the EU. Did you know? Non-compliance with DORA can result in hefty fines or even operational bans for financial entities! In this video, we’ll break down everything you need to know about DORA (Digital Operational Resilience Act) compliance, giving you the tools to: Strengthen your operational resilience Manage ICT risks effectively Meet evolving regulatory requirements.

What Happens If You Answer a Spam Call

If you accidentally answer a spam call, scammers know your number is connected to a real person and can target you with more calls. These targeted spam calls will try to trick you into giving up your personal information which allows cybercriminals to steal your money, your identity and even your voice. Learn more about how cybercriminals can exploit you using spam calls.