Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Unlocking the Future: The Journey to Biometric Security with Brivo

In today's fast-paced world, security is more important than ever. But with great security comes great responsibility – and sometimes, complex processes. Join us at Brivo as we dive deep into the world of biometric security, exploring the intricate journey of enabling biometric access control. From scanning at multiple locations to understanding the sophisticated technology behind it, we've got you covered. 🌐🔍

The Impact of FAIR on Risk Management with Jack Jones | Razorthorn Security

Welcome to Razorwire, the podcast that cuts through cybersecurity and risk management complexities. Host Jim welcomes Jack Jones, creator of the FAIR risk methodology, for an in-depth discussion on how his approach has transformed information security risk perception and management. Jack shares his journey from facing scepticism to global recognition, detailing the development of FAIR and its impact on the industry. He also previews his upcoming book on the controls analytics model, exploring the future of risk management and FAIR's role in advancing cybersecurity practices.

Real-Time Help Desk - ServiceNow ITAM/ITSM - Tanium Tech Talks #84

See how Tanium can power the ServiceNow service desk experience with real-time visibility and control on today's Tanium Tech Talk. Without leaving the ServiceNow console, help desk agents can retrieve Tanium endpoint data and then take action immediately to close tickets faster. VIDEOS IN THIS SERIES CHAPTERS.

Introducing Time-Limited Access

As an enhancement to Keeper’s secure sharing capabilities, Time-Limited Access allows you to securely share credentials or secrets with other Keeper users on a temporary basis, automatically revoking access at a specified time. Time-Limited Access prevents long standing privileges and ensures that information is removed from the recipient’s vault, greatly reducing the risk of unauthorized access. Time-Limited Access brings several key benefits to users and administrators.

ITAM & CMDB - ServiceNow Integration - Tanium Tech Talks #85

See how Tanium can feed your ServiceNow CMDB with fresh asset inventory on today's Tanium Tech Talk. We're going to start at the beginning with asset data: hardware, software, usage, and more. Many Tanium customers update their ServiceNow CMDB multiple times per day to enjoy the benefits of accurate and timely asset data. SERVICE GRAPH CONNECTOR IS THE PREFERRED METHOD. VIDEOS IN THIS SERIES.

Trilio VMware Migration To Red Hat OpenStack Platform

Welcome to this short video on using a new feature of Trilio for OpenStack to migrate VMware VMs to OpenStack. In this video, I will demonstrate how we will migrate a couple of CentOS VMs to my Red Hat OpenStack Platform cluster. Trilio for OpenStack integrates into the Horizon experience, and from here we can launch the VMware Migration plugin to create a Migration Plan.

Telephony Or VoIP Device Accessible Issue And How To Fix It On Your Scorecard

Is the "Telephony/VoIP Device Accessible" issue type bringing your rating down and you don't know what to do about it? Watch this short video which explains what these are and what you can do to improve them. SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. The company is headquartered in New York and operates in 64 countries around the globe.