Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Webinar

Combat the Erosion of Trust in Digital Media w/ Jon Geater CPO/CTO at DataTrails

Trust in digital media is consequential — from the practical verification of the source of a news photograph to the less visible web infrastructure that impacts society and economies of scale. In this Community Showcase, we’re focusing on solutions that build transparency into our digital ecosystem. See Jon Geater's demo on maintaining the integrity of data across business and application boundaries with the DataTrails platform.

The Hower - Episode 4: Clare Loveridge, Vice President and General Manager, EMEA, at Arctic Wolf.

In this episode, our hosts sit down with Clare Loveridge, Vice President and General Manager, EMEA, at Arctic Wolf. Clare is an internationally focused global leader with more than 20 years experience in sales and channel leadership roles at companies like data domain and Nimble Storage where she's grown businesses across EMEA. Clare was the first person hired in the EMEA region at Arctic Wolf to start the region almost 3 years ago.

Webinar: Is the biggest risk the one you can't see coming? With EY & Tanium

An exclusive webinar in collaboration with EY to learn how the Managed Visibility and Control joint solution addresses DORA and NIS2 regulatory compliance challenges. Organizations need to be smart about their data, network and endpoint device security while managing the associated risks as access to data becomes more fluid. Where most security breaches once came through networks, now it’s the endpoint devices becoming targets for bad actors.

Securing your cloud infrastructure with Tines & Wiz

Wiz and Tines offer a powerful solution to remediate any cloud risks detected in minutes. Wiz scans your entire cloud infrastructure and gives you complete visibility into anything that runs in it - raising vulnerabilities and bringing them to the forefront. Tines’ no-code platform then transforms, analyzes, and prioritizes information from Wiz to handle cloud remediation alerts automatically without needing to engage developers or write a single line of code.

Have Your Secrets Leaked? It's time to find out!

We understand the struggle of securing sensitive data—API tokens, cloud credentials, and database URLs have a knack for slipping into the public eye, be it in code repositories, CI job logs, or unexpected corners like Jira tickets. We've been championing this cause since 2017, scouring over a billion public GitHub commits last year alone and uncovering a staggering 10 million in 2022. We've gone beyond reports, beyond thought leadership, to unveil a real solution: HasMySecretLeaked!

Coffee Talk with SURGe: 2023-NOV-28 NCSC 2023 Review, ENISA Report, Netherlands Cyber Assessment

Grab a cup of coffee and join Ryan Kovar, Kirsty Paine, and Floris Ladan for a special EMEA edition of Coffee Talk with SURGe. The team from Splunk will compare highlights and similarities across recent cyber threat reports, including: Ryan and Floris also competed in a 60 second charity challenge to explain the importance of red teaming.

Velero Backup Essentials: Choosing What Works Best for You

Velero supports multiple types of backups including backups of resource specs, PV snapshots, backups of live PV data, and backups of PV snapshots. In this webinar, we will explain each of these methods in more detail and describe when each is appropriate and why you should pick one over another. The topic of which backup method to use elicits a lot of questions in the Velero forums and among our own user base, and we intend for this webinar to help clarify the matter.