Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Cybersecurity in the Age of Regulation - Sysdig

Cybersecurity breaches are becoming more frequent and more impactful. Adversaries continue to grow stronger, and defenders aren’t always keeping pace. On July 26th, 2023, the U.S. Securities and Exchange Commission issued new regulations on cybersecurity risk management, strategy, governance, and incident disclosure, leaving many companies concerned about how to ensure compliance with these new rules, and what changes they may need to make to get up to speed.

CyberArk Endpoint Privilege Manager & ServiceNow Integration

In this video, we delve into the seamless integration of CyberArk Endpoint Privilege Manager and ServiceNow IT Service Management. Discover how this integration streamlines and automates end user privilege elevation requests by leveraging existing ServiceNow workflows. By enhancing security measures and operational efficiency, this collaboration between CyberArk and ServiceNow marks a significant advancement in managing and securing privileged access. Watch now to learn more about this powerful integration.

Securing Database Access: DPA Zero Standing Privilege Approach with Native HeidiSQL Utility

In this video, we'll guide you through the process of utilizing CyberArk DPA's capabilities to seamlessly connect to a Postgres database using the HeidiSQL client, leveraging the secure foundation of JIT access approach for enhanced security and efficiency.

Cloudflare breach - How the Okta attack led to Cloudflare systems getting hacked: Breach Breakdown

In this video, we drill down into the recent breach of Cloudflare systems including how attackers were able to use stolen credentials from the Okta attack to move laterally and hack the Cloudflare internal Atlassian server. The security incident shows the dangers of secrets sprawl not only in internal systems but also in the supply chain leading to potential data leaks.

The 443 Podcast - Episode 278 - A Door in Apple's Walled Garden

This week on the podcast, we cover Apple's recent announcement describing how they will comply with the European Union's new Digital Markets Act and what that means for the iPhone walled garden. Before that, we cover a databreach at Mercedez-Benze thanks to an alternative authentication method. Additionally, we cover the roundup of vulnerabilities in Ivanti's remote Policy Secure and Connect Secure products and how organizations should respond.

Netwrix StealthAUDIT is now Netwrix Enterprise Auditor

Netwrix Enterprise Auditor (formerly StealthAUDIT) can help you minimize your attack surface area by discovering all the sensitive information you hold and keep access to it at the least-privilege level — while dramatically reducing the burden on your limited IT resources. Learn more at netwrix.com/enterprise-auditor Modern organizations have amassed enormous volumes of data, and more is created and collected every day. Meanwhile, cyberattacks are growing in frequency and sophistication, and compliance mandates are ever more stringent.

Securing Database Access: DPA Vaulted Account Approach with Native PGadmin Utility

In this video, we'll guide you through the process of utilising CyberArk DPA's capabilities to seamlessly connect to a Postgres database using the PGadmin client, leveraging the secure foundation of Vaulted Accounts for enhanced security and efficiency.

Keeper Webinar With ActualTech Media - Identity & Access Management

Keeper was invited by ActualTech Media to discuss Identity & Access Management: Keys to Success in 2024 EcoCast. Tom Cole, a solutions engineer at Keeper, dives into what makes KeeperPAM a next-gen privileged access management solution that delivers enterprise-grade password, secrets and privileged connection management in one unified platform.