Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The DORA Act: Transforming Digital Operational Resilience in Cybersecurity

The Digital Operational Resilience Act, or DORA, is set to redefine the landscape of digital security and operational resilience. In this video, we explore the key provisions and implications of DORA, which aims to strengthen the cybersecurity framework across the European Union.

Tutorial: Import a Certificate to the Firebox

#cybersecurity #technology #watchguard #wgsupport #firebox
In this WatchGuard Support video, you will learn how to import certificates on the firebox. Information includes:

  • Private key source
  • Available certificate import options on the Firebox
  • Complete the import process

To learn more about WatchGuard Support and other features, follow the link: https://wgrd.tech/3FoQ0eg

Add Your Own Custom Secrets Detectors To GitGuardian

Did you know you can add custom detectors to make GitGuardian Secrets Detection even more powerful? GitGuardian already looks for over 390 different types of specific secrets - from Adobe and AWS keys to Zoom and Zendesk Tokens. That's on top of looking for over a dozen generic patterns like Bearer tokens and JSON web tokens. Now, anyone on a Business plan or higher can request to extend GitGuardian's secrets detection engine to support detectors specific to their organization.

SMB Workshop Business Premium Webinar: Stripe OLT X Microsoft

In a world where IT Leaders need to manage rapid technology changes, user expectations, security concerns, BYOD policies, software licensing and budget constraints (to name a few), it’s become imperative that businesses are empowered with software that will support all of their requirements. We introduce, the Business Premium License.... This jam-packed session is centered around the value and true capabilities of the Microsoft Business Premium License, looking at how your organisation can work smarter, more efficiently and with elevated security 🔒

Small Leaks, Billions Of Dollars - Cryptographic Exploits That Undermine Leading Crypto Wallets

Nikolaos Makriyannis, Cryptography Research Lead at Fireblocks, and Oren Yomtov, Blockchain Research Lead at Fireblocks, present "Small Leaks, Billions Of Dollars: Practical Cryptographic Exploits That Undermine Leading Crypto Wallets" at DEF COM 31.

DevSecOps101: To Do or Not To Do

DevSecOps, a progression from DevOps, involves embedding security practices throughout the software development process. It emphasizes collaborating, automating, and continuous monitoring to ensure efficient delivery of secure and reliable software. We explore concepts of DevSecOps such as: We review the case of Fannie Mae, who embraced DevSecOps and succeeded in improving collaboration, reduced vulnerabilities, and accelerated software development.

Coffee Talk with SURGe: The Interview Series featuring Derrick Lawson

Join Ryan Kovar and special guest Derrick Lawson, Staff Sales Engineer at Splunk, for a discussion about M-21-31, a US memorandum establishing an event logging maturity model for federal government agencies. They’ll discuss strategies and tools that can help agencies with compliance.