Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding Attackers: The Key to Effective Cyber Defence

In this clip, Robert Black emphasises the importance of understanding attackers' decision-making processes. By building networks with the attacker's perspective in mind, organisations can better influence and deter potential threats. Learn why considering the human element in cyber threats is crucial.

Unlocking Success: The Power of Strategic Alliances in Tech | John Szczygiel's Insights

Dive into the world of strategic alliances with John Szczygiel as we explore how open and flexible technological solutions can be a game-changer for businesses aiming for success and competitiveness in today's fast-paced market. Discover the critical role of strategic partnerships in driving innovation and growth, and learn why adopting such technologies is more than a choice—it's a strategic imperative.

Protecto - Secure and HIPAA Compliant Gen AI for Healthcare

Generative AI is often seen as high risk in healthcare due to the critical importance of patient safety and data privacy. Protecto enables your journey with HIPAA-compliant and secure generative AI solutions, ensuring the highest standards of accuracy, security, and compliance.

Breaking Barriers: Demystifying Zero Trust with Chase Cunningham & Keeper Security

Zero trust is a powerful cybersecurity approach, but its implementation remains a challenge for many organizations. In this webinar, renowned expert Chase Cunningham demystifies the concept of zero trust and provides practical strategies to overcome the barriers to its adoption. Cunningham explores the core principles of zero trust, dispelling common misconceptions and highlighting its benefits in protecting against modern cyber threats. Drawing from real-world experiences, he'll guide you through the process of implementing robust zero-trust architectures tailored to your organization's needs.

Keeper 101 | Enterprise - How to Set Role-based Access and Controls in Keeper

Learn how to set role-based access and controls in Keeper with our step-by-step guide. In Keeper’s architecture, Roles and Teams are separate concepts. A Role defines permissions, policies and what features and security settings apply to users. Roles also define the administrative capabilities of those users. Teams are specifically used for sharing privileged accounts among users within the vault. Teams and Roles can be linked to automatically assign a role policy to all members of a team.

Keeper 101 | Enterprise - How Keeper's Advanced Reporting & Alerts Module Works

Learn how Keeper's Advanced Reporting & Alerts Module works within Keeper Enterprise. This module provides insight to assess vulnerabilities related to administrative changes, password reuse, unauthorized access, password stuffing attacks and insider threats.. The “Reporting Dashboard” provides a quick view of top events, the “Recent Activity” and "All Security Events” reports and any saved custom reports. Monitoring these events can assist in the detection of several threat vectors and help establish enforcement policies around vault and privileged account access.