Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Container Security Fundamentals - Linux Namespaces (Part 2): The PID Namespace

In this video we continue our examination of Linux namespaces by looking at some details of how the PID namespace can be used to isolate a container’s view of processes running on the host, and how this feature can be used for troubleshooting container problems. To learn more read our blog on Datadog’s Security Labs site.

Security Service Edge (SSE) Explained

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data. The Netskope Intelligent Security Service Edge (SSE) platform is fast, easy to use, and secures people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers, including more than 25 of the Fortune 100, trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements. Learn how Netskope helps customers be ready for anything on their SASE journey.

What is the Cato Management Application?

Are you looking to get started with Cato Networks, but you're unsure how to begin? Join Robin Johns as he provides you with a tour of the Cato Management Application, and shows you how easy it is to deploy sites, configure users, monitor your applications and performance, while securing your network; all in one place.

Methods to Follow While Accessing Customer Sensitive Data | (Sanjay - Executive Director, MSCI)

Here are some highlights of the conversation between Sanjay (Executive Director, MSCI) and Venky (Founder, Indusface). Sanjay has worked in Microsoft for over 14+ years and shares his experience on secure coding best practices & methods to handle customer-sensitive data.

Three Guiding Principles to Follow in Cybersecurity | (Sanjay - Executive Director, MSCI)

Here are some highlights of the conversation between Sanjay (Executive Director, MSCI) and Venky (Founder, Indusface). Sanjay has worked in Microsoft for over 14+ years and shares his experience on secure coding best practices & methods to handle customer-sensitive data.

GitGuardian Protects Teams From Closing Incidents With Valid Secrets

GitGuardian puts safeguards in place in order to help busy cybersecurity teams work smarter and safer, such as preventing incidents with detected valid secrets from being accidentally resolved. It is one more way GitGuardian can help you improve your secrets management posture.

The 443 Podcast - Episode 249 - Q1 2023 Internet Security Report

This week on the podcast, we cover WatchGuard Threat Lab's Internet Security Report for Q1 2023. Throughout the episode, we'll discuss the key trends for cyber threats impacting small and midsize organizations globally including the top malware and network attach detections as well as a look specifically at the endpoint. We round out the episode with key defensive takeaways you can take back to your organization to defend against these threats.

Astra Review - How Rebrandly Uses Astra for Continuous Pentests

Established in 2015 by David De Guz, Rebrandly provides a holistic link management platform to create substantial touchpoints between brands and their customers. Embracing the assets links to every company, Rebrandly’s link management services help brand, track, and share short, catchy URLs with customized domain names.