Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

CyberTalk with Bill and Robin - 24th May 2023

Join Bill Carter and Robin Johns as they talk about all about the latest hot news and topics in the world of cybersecurity! In this week's episode, Bill and Robin cover the expanding scope of Ransomware with threat actors such as Black Basta running rampant, as well as the new 'suspicious' TLD of.zip! How do these threat actors keep getting away with their attacks, and why should you be concerned about these new top-level-domains? Learn all this and more on the latest episode.

All-in-One Insider Risk Management Platform - Ekran System

Ekran System offers a versatile set of features and tools to control insiders’ actions in your infrastructure and timely detect breaches in corporate security. Obtain a 360-degree view of your infrastructure with continuous employee and third-party activity monitoring and session video recording complemented by rich metadata indexing. Promptly respond to suspicious insider activity by leveraging user and entity behavior analytics (UEBA) and customizable alerts and rules for blocking malicious actions.

Teleport Assist - GPT-4 powered DevOps assistant.

Introducing Teleport's new GPT-4 powered DevOps assistant, Teleport Assist. Leveraging the foundation of Teleport's Open Infrastructure Access Platform, with its complete inventory of your infrastructure, Teleport Assist utilizes facts about your infrastructure to help answer questions, generate command line scripts, and help you perform routine tasks on target nodes.

Greatest Threats to Businesses Today: Insights by ChatGPT

Discover the prevailing threats that pose a constant challenge to businesses in today's ever-evolving world. Join ChatGPT as we explore the diverse array of threats faced by businesses and uncover the most significant among them. While the nature of the threat may differ based on factors such as industry and business size, several common threats prevail across the board. Cybersecurity threats, including hacking, malware, and ransomware attacks, have reached unprecedented levels of sophistication, constituting a substantial menace to businesses.