Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Restore Individual Files from PVC by CloudCasa?

Need to recover individual files from a Kubernetes Persistent Volume Claim (PVC)? In this demo, CloudCasa Field CTO Martin Fon walks you through file-level restore from PVC using CloudCasa’s intuitive user interface. No need to modify backup jobs—just point, click, and restore files or folders directly to your original or alternate cluster. Key highlights: • Explore PVC contents from your backup Whether you're dealing with accidental file deletion or need selective recovery for compliance, CloudCasa makes granular file recovery from Kubernetes backups simple and powerful.

Golden Image Configuration with Falcon Exposure Management

When configuration drift creeps in, it can lead to inconsistent environments, audit delays, and security gaps. With Golden Image in Falcon Exposure Management, teams can quickly establish a secure baseline and replicate it across the organization. This demo walks through how to set up a policy, assign a rule group, and use a template image to automatically pre-configure benchmark settings. You’ll see how easy it is to detect misconfigurations, fine-tune rules to match your standards, and stay ahead of compliance requirements.

Using LimaCharlie as an Observability Pipeline to reduce SIEM storage costs

LimaCharlie's SecOps Cloud Platform (SCP) creates a scalable, versatile, and actionable observability pipeline by collecting and standardizing telemetry from the full security stack. Stream data from any input, route it to any output. The SCP provides visibility into telemetry sources and empowers users to create automated responses to actionable events in the pipeline.

Defending the Physical World: OT Security and Incident Response with Lesley Carhart

In this eye-opening Defender Fridays session, industrial cybersecurity expert Lesley Carhart explains how OT incident response differs fundamentally from traditional IT security, where the stakes involve potential loss of human life, environmental damage, and critical infrastructure failure.

PCI DSS Compliance for Small Businesses: A Step-by-Step Guide

Small Business Owners: Don't Let PCI DSS Crush You! (Your Step-by-Step Survival Guide!) Did you know a staggering 60% of small businesses can shutter within just SIX MONTHS after a data breach? And those PCI DSS fines? They can bleed you dry – ranging from $5,000 to a whopping $100,000 per month!

Do You Need More Than One PAM Solution?

When managing complex IT environments, many organizations wonder: Is one Privileged Access Management (PAM) solution enough? In this video, we break down why using multiple PAM tools can actually do more harm than good. From increased complexity and integration issues to higher costs and potential security gaps, we’ll explain why consolidating your PAM strategy is the smarter choice. Learn how a unified PAM platform like KeeperPAM helps simplify privileged access management while improving security and reducing overhead.