Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Keep an Identity Attack from Compromising your Infrastructure

Identity Platforms (IdP) provide organizations with incredible convenience with Single Sign-On (SSO). However, if IdPs are compromised, the ‘keys to the castle’ can be left vulnerable, making the rest of the organization’s infrastructure vulnerable as well.

Keeping Financial Services Organizations Secure in an AI World

When we talk about financial services and technology, security and regulatory compliance are always top of mind. And now, Generative AI has entered the chat - one of the most talked-about technologies of recent years. And Financial Services institutions have only begun to scratch the surface of what generative AI can do. The problem is, so have cyber threat actors. In this session from Splunk, and IDC, you’ll hear key insights into how financial services companies are improving their security posture in an AI World, and how those practices can benefit your organizations.

TCA Tanium Certified Administrator - Certification Series - Tanium Tech Talks #100

Welcome to this installment of the Tanium certification series. Today we're looking at the entry level Tanium Certified Administrator exam, the TCA. As with other exams in this series, I've invited one of the experts who helped write the exam questions to give us an insider's look at what is covered and to help you prepare.

TCO Tanium Certified Operator - Certification Series - Tanium Tech Talks #99

Welcome to this installment of the Tanium certification series. Today we're looking at the entry level Tanium Certified Operator exam, the TCO. As with other exams in this series, I've invited one of the experts who helped write the exam questions to give us an insider's look at what is covered and to help you prepare.