Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Secure and Recover Your IBM AIX Data with Rubrik Security Cloud

Safeguard your critical business data on IBM AIX servers with Rubrik Security Cloud. This video guides you through securing your AIX environment using Rubrik's comprehensive data protection and cyber resilience solution. Key benefits you'll discover: Centralized Management: Gain unified visibility and control over your entire IT infrastructure, including cloud, on-premises, and SaaS workloads, from a single, intuitive Rubrik dashboard.

Episode 3:Weaving privilege elevation controls into your access management routines

In the third episode, we will delve deep into implementing the basics of privilege elevation and delegation management (PEDM) to enforce time-limited, requirement-based access to mission-critical resources. Join us to learn more about how you can grant access permissions to your users on an all-or-nothing basis and make the most of our PAM solution to handle real-time PEDM challenges.

Random but Memorable - Episode 12.6: Shadow IT Incident Sequel with Charlie from Wagestream

Whether or not you're familiar with shadow IT, know this: it's everywhere. Our guest this week, Charlie Livingstone, shines a light on the growing problem of shadow IT and how Wagestream are managing the risks it poses. Sit down with Roo and Charlie, as they unpack what shadow IT actually is, the growing challenges associated with it, and what we can do to safeguard ourselves and our organizations. 🔦🖥️

Revolutionizing Daily Tech: AI's Role in Our Everyday Lives

Dive into the fascinating world of how artificial intelligence is seamlessly woven into the fabric of our daily technology, transforming the mundane into the extraordinary. At Brivo, we've been at the forefront of integrating generative AI into cloud-based solutions, redefining what's possible in commercial real estate, multifamily residential, and large distributed enterprises. Join us as we explore the endless possibilities that AI brings to everyday technology, making our lives more secure, efficient, and connected.

Why you NEED an Open Source Vulnerability Scanner

Here are 7 reasons why you need an open source vulnerability scanner. ✍️ Resources ✍️ ⏲️ Chapters ⏲️ ⚒️ About Snyk ⚒️ Snyk helps you find and fix vulnerabilities in your code, open-source dependencies, containers, infrastructure-as-code, software pipelines, IDEs, and more! Move fast, stay secure.

The 443 Podcast - Episode 287 - Ending Session Hijacking

This week on the podcast, we cover a Google initiative to kill off session hijacking attacks once and for all. Before that, we give an analysis of CVE-2023-3400, the Palo Alto zero-day vulnerability currently under active exploit. Additionally, we discuss a recent white paper from CISA on securely deploying artificial intelligence systems. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.