Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

AI Integration Dilemma: Cost Challenges for Small Businesses vs. Power Play of Tech Giants #podcast

In this insightful video, we delve into the complex landscape of AI integration and its potential cost barriers for smaller organizations. The good news? When it comes to chatbots (CHT), leveraging data access APIs and seamless integration doesn't necessarily mean breaking the bank on AI engine costs. You pay for what matters – the data journey to their APIs.

See Falcon Fusion in Action

Breach containment is a race against time. Falcon Fusion, integrated within the CrowdStrike Falcon® Platform, harnesses AI and automation to expedite incident detection and response. Experience how Falcon Fusion streamlines security workflows, enabling teams to take down threats 108 days quicker on average, providing a swift and strategic defense that keeps adversaries at bay.

Random but Memorable - Episode 11.9: Modern Cloud Threat Socks with Datadog

Should businesses be worried about the AI security threat? How do we protect our children's devices from malware? We dive into all that and more in Watchtower Weekly. Plus, we sat-down with Jason and Nimisha from Datadog to discuss some of the challenges of securing the cloud and why it's important to get cloud security right. We also unveil a new 1Password SIEM integration with Datadog that gives you greater visibility into the security posture of your business, all from one central location! 🤖🐕

Unlocking Cyber Resilience: Strategies from the 2023 Global Ransomware Trends Report

Recent findings from the 2023 Global Ransomware Trends Report, reveal a concerning uptick: 85% of organizations experienced a cyberattack in the past year, up from 76% the previous year. Understanding the nuances of defense and recovery becomes paramount as cyber threats escalate. Join us for this essential discussion based on insights from one of the most extensive independent studies to date, encompassing 1,200 organizations from 14 different countries. All these organizations have one thing in common – they’ve braved cyberattacks.

Webinar Replay: Q3 2023 Threat Landscape: Social Engineering Yields Initial Access

“From using QR codes in emails to sharing links via Microsoft Teams, threat actors are evolving their methodology to manipulate humans to click on the bait. This is not phishing through email; it's phishing through an instant messaging platform.” – Laurie Iacono.

What is Lookout Secure Private Access? A ZTNA Solution

Lookout Secure Private Access is a data-centric zero trust network access (ZTNA) that provides seamless connections to private apps – whether they reside on-premises or in the cloud – all while strengthening your data security posture. Watch this video to learn why you need ZTNA, how Lookout Secure Private Access works, and how it can protect your data no matter where it goes.

The Rise In Vulnerability Disclosure, Exploitation and Threat Intelligence

Patrick Garrity, Security Researcher at Nucleus Security, discusses the rise of vulnerabilities exploitation and threat intelligence in the field of vulnerability management. He highlights the history of vulnerability management, the increase in vulnerabilities and exploitation, the limitations of the common vulnerability scoring system (CVSS), and the emergence of vulnerability threat intelligence. Patrick also emphasizes the importance of open-source intelligence, such as CISA's Known Exploited Vulnerabilities (KEV) List and the Exploit Prediction Scoring System (EPSS), as well as the value of commercial threat intelligence.