Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

How Corelight's ServiceNow integration speeds response

See how the integration between Corelight's Open NDR platform and ServiceNow allows analysts to send specified detections to ServiceNow, enabling efficient case management for in-depth analysis. Send selected detections with contextual information to ServiceNow with a few clicks, and easily jump from ServiceNow to view detection-related details in Corelight, resulting in faster time to case resolution/MTTR.

Consolidating risk visibility with Software Risk Manager | Synopsys

Organizations use many AST tools to test software, across all stages of development, for different types of issues. However, these tools are often siloed, and security teams don’t have a way of summarizing the data they generate to understand what to prioritize, test, and fix. This has driven the evolution of Application Security Posture Management (ASPM) solutions which consolidate findings and centrally manage testing, security workflows, and risk visibility across all applications.

Hot Takes Episode 1: Protect your infrastructure from yourself

This Month’s Hot Take: Five renowned experts from the Kubernetes community - Kat Cosgrove, Divya Mohan, Frederick Kautz, Chris Short, and Kunal Kushwaha - will be discussing how human-error is the most significant threat to the security of your infrastructure, NOT hackers and ransomware.

Introducing Panoptica, Cisco's Cloud Application Security Solution

This short video introduces Panoptica, the Cisco Cloud Application Security solution, which includes Cloud Native Workload Protection (CWPP), Cloud Posture Security Management (CSPM), Kubernetes Posture Security Management (KSPM), Application Programming Interface (API) security, Infrastructure as Code (IaC) security and much, much more. Come see how easy Panoptica makes it to secure your entire cloud native application, from code to cloud!

How to Protect Your Business From Data Breaches with Panoptica

The global average cost of a data breach is now $4.45M, per IBM/Ponemon. Learn how to protect your business from such breaches by examining a ‘ripped from the headlines’ case-study (Pegasus Airlines) and how Panoptica can protect your business from such a breach.

DevNext Workshop 2: Innovate More...Remediate Less with JFrog DevOps-Centric Security

Watch the recording of the second workshop in the JFrog DevNext series - JFrog Security. The live audience experienced a real-time, hands-on event to help them develop their skills with the JFrog platform and how to easily secure their software supply chain.

SEO Challenges: Tool Thefts, Short Lifespan, and Implementation Struggles || Razorthorn Security

Description: In the ever-evolving landscape of SEO, the operation is no longer as simple as it once was. It goes beyond just worrying about your own digital "house"; now, you must also consider the connected houses in the vast online neighborhood. Tool thefts add another layer of complexity to the SEO game, requiring constant vigilance to safeguard your digital toolkit.