Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Datadog On Secure Remote Updates

In modern dynamic environments there is a requirement to be able to quickly respond to signals and change the configuration of your applications and systems. As Datadog supports an ever widening set of customer use cases, it has become necessary to allow for updates to systems directly from Datadog's platform. In this session, host Rory McCune (Senior Advocate) will be joined by Arthur Bellal (Staff Engineer) and Paul Coignet (Software Engineer II) from the fleet automation team to discuss how Datadog approached the challenge of building out a secure remote update facility.

Customize Your Team's Remediation Messages In ggshield

We are very proud to announce that you can now easily provide your own custom remediation messages in ggshield, the GitGuardian CLI. Earlier versions of ggshield offered the same general remediation advice to all users if a secret was detected when using git hooks for automated scanning.

GitGuardian's FP Remover Dramatically Reduces False Positive In Scans

Do you hate false positives in your secrets scan results? We do too. GitGuardian has introduced a whole new approach to eliminating false positives, eliminating them by around 50% so far. And we are just getting started! GitGuardian's Machine Learning experts and Secret Detection team have created "FP Remover", a new in-house machine learning model that significantly reduces false positives by understanding code context and semantics while enforcing security and privacy best practices.

Enterprise Privileged Access Management (PAM) Explained | miniOrange

Welcome back! In this video, we will explore how miniOrange’s Privileged Access Management (PAM) solution can secure your businesses. Learn how PAM provides tighter control over privileged accounts and offers visibility into user activities once logged in, ensuring your high-tier systems and applications remain secure. Whether you're aiming to enhance your security strategy or simply understand more about PAM, this video has all the insights you need!

Avast Secure Browser: Browse Privately & Securely | Take Control of Your Online Privacy

What you do online should be your business and your business alone. In today’s digital world, unfortunately, a lot of what you do is tracked by advertisers and hackers. With Avast Secure Browser, you can browse more privately and securely. We help prevent advertisers from tracking you, and collecting your personal data, offering a range of blocking options. Select from Basic, Balanced, or Strict Blocking to customize your level of privacy. Plus, our Password Manager ensures the keys to your digital identity stay secure.

Trailer: Measuring Your Data's Risk Exposure #CyberSecuritypodcast #CyberSecurity #shorts

Mike Tyson famously said, 'Everybody has a plan till they get punched in the face.' In cybersecurity, traditional strategies focus on preventing attacks—essentially planning for the punch. But what happens when the punch lands? It’s not just about the breach itself; it’s about how an organization responds. True resilience is measured by how swiftly and effectively you rebound. Strengthening infrastructure, refining processes, and enhancing talent are crucial steps in not just surviving but thriving after an incident.