Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Install Greenlight Visual Studio Extension

In this video, you will learn how to install the Veracode Greenlight for Visual Studio extension. Veracode Greenlight finds the defects in your code as you write it and provides recommendations and code examples to help you fix them directly in your IDE. It allows you to write quality secure code from the very beginning while perfecting your understanding of application security Best Practices.

CrowdStrike Cloud Infrastructure Entitlement Management (CIEM)

Identity theft and overly permissive accounts are major challenges faced by organizations in public and hybrid cloud environments. Learn how CrowdStrike Cloud Identity and Entitlement Management (CIEM) can increase the security of your cloud infrastructure while simplifying management across clouds.

Splunk CEO Gary Steele and Juliana Vida discuss GovSummit 2022 and Compete in Coffee Talk Challenge

In a special GovSummit edition of Coffee Talk with SURGe, Splunk CEO Gary Steele and Juliana Vida, Chief Technical Advisor for the Public Sector discuss GovSummit 2022 and what cyber resiliency means to them. They also face off in a challenge to guess whether different security marketing terms are real or fake.

Webinar: 2023 Security Predictions - 15 Dec 2022

Every year, the WatchGuard Threat Lab team likes to dust off the crystal ball and predict the way cyber threats and information security will evolve going forward. Though we base our forecasts on quantifiable trends we’ve seen in the past, we also take the opportunity to extrapolate the more futuristic and dystopian cyber outcomes that might occur if attackers were left unchecked. In the end, our goal is to share how defenders must adjust to ensure we avoid the worst outcomes.

Going Beyond Unit Testing | How to Uncover Blind Spots in your Java Code with Fuzzing

Check out fuzz.ci/cli to try out the tool for yourself! While most Java developers already use unit testing to test whether their application behaves as expected, complementary testing approaches such as fuzz testing enable them to also check their applications for unexpected or strange behaviors that could lead to crashes and make them vulnerable to Denial of Service (Dos) attacks or Zero-Day exploits.

MSPs! The Power of Octiga Office 365 Baselines Templates

Octiga makes it possible to redeploy your MSP’s best-practice security posture consistently, across multiple clients. Set a template posture for your clients and easily manage them in a single click whenever a baseline update is required. Apply & maintain continually and cohesively in a few seconds.