Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Manually Installing LimaCharlie Net

This video walks through the manual installation of LimaCharlie Net. LimaCharlie Net (lc-net) allows you to secure and monitor network access to your endpoints by providing advanced instrumented VPN access. lc-net endpoints appear like other endpoints in your LimaCharlie deployment, but they're quite different in nature. These lc-net endpoints need to be provisioned to be accessed. By provisioning an lc-net endpoint, you create a set of VPN credentials that can be used by a single device. One set of credentials should be used by only a single device, and not shared among devices.

Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte

This webinar is designed for Small & Midsize Businesses that work as federal prime or subcontractors. Our guest, Jayme Rahz, CEO at Midway Swiss Turn, represents a local manufacturer that has recently undergone a series of guided steps with Ignyte’s team and implemented over a hundred vital controls into their cybersecurity routine to become NIST and CMMC compliant and be able to conduct a self-assessment for the NIST 800-171 SPRS submission.

Splunk SOAR Feature Video: Playbooks

Splunk SOAR playbooks automate security and IT actions at machine speed. Playbooks execute a sequence of actions across your tools in seconds, vs hours or more if you perform them manually. Splunk SOAR comes with 100 pre-made playbooks out of the box, so you can start automating security tasks right away. Splunk SOAR’s visual playbook editor makes it easier than ever to create, edit, implement and scale automated playbooks to help your business eliminate security analyst grunt work. *Users can build and edit playbooks in the original horizontal visual playbook editor, or the vertical visual playbook editor introduced in August 2021.

Spotlight on Technology: Privileged Access Management

In the second of our new series, Spotlight on Technology, we take a look at privileged access management with James Rees MD of Razorthorn cyber security consultancy, & David Higgins, EMEA Technical Director of CyberArk, leaders in identity security and access management. Accounts with privileged access are gold dust for malicious actors and gaining access to these, and the sensitive data these accounts have access to, can cause some huge and costly problems for the targeted organisation.

CISO Insider - S2E6 - Data is trust with Emilio Escobar

Datadog CISO Emilio Escobar joins Chris Martinez on CISO Insider for a discussion on data security approaches for today’s cloud-first world. Emilio shares how he sees infosec: creating security responses based on people and teams over brute force blocking of apps and systems. This approach allows Datadog to defeat the enemy of complexity in IT service quality, and helps build a more inclusive culture at the company. By seeing data as trust, Emilio can influence his teams to find better solutions to data security problems and learn from typical pain points. We get into all this and a lot more in the chat today.