Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Welcome To Rubrik Security Cloud

The Rubrik Zero Trust Data Security™ platform, Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Hello CISO - Episode 8: Common Sense Security Policies and Bullshit Ones

The best policies for security aren’t always the policies that end up in the company security manual. Why? In this episode, Troy explores the difference between good security policies and CYA security policies… and how to close the gap between the two. Hello CISO is a collaboration between Troy Hunt and the people who build the world's most trusted enterprise password manager. To learn more, visit 1Password.com/business, and don’t forget to subscribe to be notified of new episodes.

What is API Security?

In a nutshell, API security refers to the strategies and tools organizations use to protect APIs from security vulnerabilities and malicious threats. Learn how protecting APIs differs from application security, as well as the four key pillars that make up API security - API discovery, posture management, runtime protection, and API security testing.

iOS 2FA Setup for Websites and Apps

For added security on supported websites and apps, use Keeper to store two-factor authentication codes. When setting up 2FA on a site or app, Keeper for iOS can serve as your time-based one-time password or “TOTP” generator. This video will review how users can easily add a two-factor verification setup code or secret key from a website or app to a new or existing Keeper record. Initial Configuration Steps

Negotiating With Hackers to Unlock Your Data - What You Need to Know!

Are you concerned about the recent ransomware attacks? Tune into this episode to gain valuable insight into the complexities of negotiating with a ransomware group. In this episode, I am joined by cyber security experts, Richard Cassidy and Oliver Rochford, to share their experiences and knowledge to help you understand the impact of ransomware and how best to respond to ransomware groups if you find yourself in that situation.

Snyk Workflows - Ignores & PR Checks

Snyk integrates with your IDEs, repos, workflows, and automation pipelines to add security expertise to your toolkit. The “menu” of options available to you is extensive, so we created this three-part series to get you started and running. Do you want your dev teams and AppSec teams to be aligned? The second session of the series digs deeper into using ignore capabilities. You’ll also learn about PR checks. This is a great way to get ahead of permissions.

Stranger Danger: Your Java Attack Surface Just Got Bigger

Building Java applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome, you're a cloud native application developer! As developers, our responsibility broadened, and more software means more software security concerns for us to address.