Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Sumo Logic & Gigamon -- Three Top Security Use Cases

Together, Gigamon and Sumo Logic enable organizations to build an effective and efficient monitoring and security posture. Matt Rosenbaum, Partner Architect at Sumo Logic and Stephen Goudreault, Cloud Security Evangelist from Gigamon cover three top Security Use Cases for this integration. Security Posture Suspicious Activities Rogue Activities As premier AWS partners, you can find both Sumo Logic and Gigamon in the AWS Marketplace.

Sumo Logic Cloud SIEM explainer video

Sumo Logic Cloud SIEM helps teams broaden threat visibility across the entire enterprise. With uniformity, clarity and transparency, companies can bring all their security tools together for complete visibility. Cloud SIEM automates real-time threat investigation, incident management and threat response while reducing false positives and analyst fatigue. Bring your teams together with centralized data and cloud-native scale in a SaaS Log Analytics Platform that breaks down silos.

Maximizing Data Security in the Cloud - Outperforming On Premise Solution - it-sa 2023 Keynote

In an era where data breaches and cyber threats continue to escalate, businesses are seeking robust security solutions that offer a competitive edge. This session will delve into the advantages and advancements of cloud-based security systems, providing attendees with a comprehensive understanding of how cloud solutions can outshine their on-premise counterparts. We will explore the latest technologies, best practices, and real-world case studies to demonstrate the superior security measures offered by cloud-based solutions.

Is retail a security fail? Make sure your PoS is not a POS

Whether it's a brick-and-mortar storefront or an e-commerce platform, no player in the retail space is safe from cyberattacks. Over the past decade, we have seen major breaches of big-name stores, resulting in multi-million dollar settlements and hundreds of millions of affected users. But what exactly is going on here? We will examine the mechanisms cybercriminals use to exploit retail stores and platforms, what they look for, and, most importantly, what can be done to thwart threats and leave cyber criminals on the shelf.

Get your head in the clouds

Today’s forecast is cloudy, with a chance of headaches, heartburn, and a hell of a lot of unforeseen security challenges. Digital transformation may not be a new term, but it is, nonetheless, still very much a part of the roadmap for many companies. No matter if a company is cloud-native or newly embracing the cloud, the issues of securing your cloud infrastructure can be daunting, from managing misconfigurations to monitoring hundreds of microservices. Managing your cloud attack surface can leave you feeling like Sisyphus. But if you’re feeling a little bolder (see what we did there?), you can take a deeper dive into how you can get your head in the cloud and in the cloud cybersecurity game.