Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyber Essentials or Cyber Essentials Plus? Which do you need? | Product Explainer

Cyber Essentials is worth getting. You probably know this already, but what about Cyber Essentials Plus? Which one do you need, which one should you get, which one's better? If these are questions you have, then boy do we have the video for you.

Unveiling BDRSuite v7.0.0.U1: Elevate Your Data Protection Strategy

Uncover the New Features and Enhancements: Gain insights into the innovative features and enhancements that set BDRSuite v7.0.0.U1 apart in the realm of data protection Practical Guidance for Getting Started: Learn the smooth transition and optimal utilization of its powerful features Live Demonstration: Witness the power of BDRSuite v7.0.0.U1 through a live demonstration, providing live experience of its capabilities in action.

How to Conduct a Diary Study to Uncover User Needs with Rubrik User Researcher Jenny Li

How well would you say you know your users? Are you a designer, product manager, startup founder or anyone looking to better understand the needs of their target audience and wondering whether a diary study is the right methodology for your discovery research project? Look no more! Jenny Li's talk will help you understand how to conduct a diary study, what you need to plan for, and what you'll get out of it.

How Jaguar Land Rover and Asda are Building a Modern DevSecOps Culture

Organizations at different stages of growth or maturity will have different challenges when adopting a modern DevSecOps program. In this session we talked with Mike Welsh, Lead Enterprise Security Architect DevSecOps, at JLR, and Ruta Baltiejute, DevSecOps Lead at Asda, about their differing approach to implementing a secure development model at their organizations. We discussed the significant differences between how they’re building software today, including their approach to change in People, Process and Tooling.

How Lookout Mobile Endpoint Security Protects Against Evolving Threats

To stay ahead of cyberattacks, it’s important to understand how threats are evolving - especially in areas like mobile devices where you tend to have less visibility into risk. Watch this 2-minute video to learn what mobile threats you should be most concerned about, what makes you vulnerable to mobile attacks, and how Lookout Mobile Endpoint Security leverages telemetry from over 300 million mobile apps, 220 million devices, and billions of web items to detect and respond to mobile threats.

What is DAST (Dynamic Application Security Testing) 60 sec explainer

Discover the Power of DAST in Cybersecurity | Dynamic Application Security Testing Explained In the digital age, cyber threats are a constant concern. Protecting your organization's data and systems is paramount, and that's where DAST (Dynamic Application Security Testing) comes into play!

SEC's Cyber Wake-up Call: The Evolving Role of the CISO (LIVE)

Join us for a LinkedIn Live panel discussion between industry experts Matt Stamper (CEO, Executive Advisors Group LLC), Colleen Lam (General Counsel, Sysdig), and Andrew Thorpe (Partner at Gunderson Dettmer and former Special Council at the SEC), as they dissect the seismic shifts in the cybersecurity landscape post the SEC's updated guidelines and the Solarwinds complaint.

Protecto - Data Protection for Gen AI Applications. Embrace AI confidently!

Worried your AI is leaking sensitive data? Stuck between innovation and data protection fears? Protecto is your answer. Embrace AI's power without sacrificing privacy or security. Smartly replace your personal data with tokenized shadows. Move at the speed of light, free from data leaks and lawyer headaches. Protecto enables Gen AI apps to preserve privacy, protect sensitive enterprise data, and meet compliance in minutes.