Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing Database Access: DPA Vaulted Account Approach with Native HeidiSQL Utility

In this video, we'll guide you through the process of utilising CyberArk DPA's capabilities to seamlessly connect to a Postgres database using the HeidiSQL client, leveraging the secure foundation of Vaulted Accounts for enhanced security and efficiency.

Keeper Webinar With ActualTech Media - Identity & Access Management

Keeper was invited by ActualTech Media to discuss Identity & Access Management: Keys to Success in 2024 EcoCast. Tom Cole, a solutions engineer at Keeper, dives into what makes KeeperPAM a next-gen privileged access management solution that delivers enterprise-grade password, secrets and privileged connection management in one unified platform.

A New Strategy for Reducing API Risk

As organizations increasingly embrace APIs, a new challenge has emerged - the complexity of managing, securing, and understanding the sprawling API landscape within an organization. To tackle these concerns head-on, Salt Security has pioneered the industry's first API posture governance engine and a suite of advanced capabilities designed to bring clarity, security, and efficiency to your API ecosystem.

Friday Flows Episode 19: Manage CrowdStrike IOCs in Slack

Analyst’s often take in IOCs from many different sources and manually copy & paste them into security tools to search for them across environments or add them to blocklists. This can be time-consuming & repetitive. This Friday Flows features a workflow that utilizes APIs to easily manage IOC’s in CrowdStrike & collaborate with peers in Slack.

Network Analytics Logs: Using Splunk to view network traffic and DDoS attacks

Cloudflare Magic Transit is a network security solution that offers DDoS protection, traffic acceleration, and much more from every Cloudflare data center— for on-premise, cloud-hosted, and hybrid networks. In this video, we show how to integrate Cloudflare Network Analytics logs to view network traffic and DDoS attacks in your Splunk dashboard.

Navigating Deep Fakes and Geopolitical Risks in 2024: The AI Defensive Edge || Razorthorn Security

Dive into the complex world of deep fakes and the looming geopolitical risks of the upcoming year in my latest video. From the potential misinformation campaigns during elections to the role of AI, I explore how these elements intertwine and impact our digital landscape. AI is not just a potential threat; it can also be a formidable defense. I discuss the emergence of AI-driven products designed to counteract misinformation and the evolving landscape of AI battling AI. Are we stepping into a future reminiscent of sci-fi, where machines combat each other, leaving humans out of the crossfire?

DevSecOps Security Best Practices

Carmine Acanfora, Solutions Architect at JFrog in the EMEA region, leads this security best practices webinar. In this webinar, we discuss the advanced features of the JFrog Advanced Security solution, now available in self-hosted mode. We will take the time to address your questions, particularly on topics crucial for all developers, such as: Don't miss this opportunity to explore JFrog's latest security solution and learn how to accelerate and secure your software supply chain with the first DevOps-oriented security solution on the market.