Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Tanium Zero Trust - Microsoft Entra ID - Tanium Tech Talks #119

When zero trust "works", it means that user productivity is interrupted, usually for hours. Tanium is your real-time data source for trust data of managed endpoints. Integrate with Microsoft Azure Entra ID for a better together story with the following benefits: Watch the demo. Then use the links below to learn more and try it with the hands-on walk through.

How to Streamline Your Atlassian Tool Stack for Maximum ROI | Webinar miniOrange & Seibert Solutions

Are you spending more on Atlassian than you should? Unused add-ons, inactive licenses, and overlapping tools can silently drain your budget. In this exclusive webinar, hosted by miniOrange and Seibert Solutions US, our experts share proven strategies to take control of your Atlassian ecosystem and maximize the return on your investment.

Can DSPM Really Help Backup Admins?

In this episode of Into the Breach, James Purvis is joined by Filip Verloy to discuss a rarely explored but highly impactful topic: Can DSPM help backup administrators? Together, they dive into how DSPM enhances visibility, optimizes backup strategies, reduces costs, and strengthens cyber resilience. From managing redundant data to supporting recovery efforts during ransomware attacks, this conversation highlights DSPM's potential to revolutionize traditional backup processes while addressing modern regulatory demands.

Stop API Attackers in Their Tracks: Real-Time Blocking of API Attacks

No one needs more security alerts! Wallarm is designed from the ground up to actually block API attacks in real time. Learn how you can defend against API attacks, not just detect them in this webinar. We'll review the basics of API security, along with a demo of the Wallarm platform in action.

Access your data with Federated Analytics for Amazon Security Lake with Splunk, AWS, and Accenture

Federated Analytics gives organizations the full power of Splunk extended to data stored in Amazon Security Lake. Trusted partners like Accenture are helping bring these new capabilities to life at organizations around the world.

February 18, 2025 Cyber Threat Intelligence Briefing

February 18, 2025 Cyber Threat Intelligence Briefing This week’s briefing covers: CL0P Update CL0P updated their data leak site with a new victim list of approximately 43 organizations. The organizations are likely from the previous redacted list containing company names from C-E and are possibly associated with the Cleo zero-day vulnerability.