Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

The Lightbulb Moment for SecurityScorecard

“Alex, I don’t think you are doing a good job,” said the chairman as I presented my progress. I was shocked. At that time, I was working as the Chief Security Officer at Gilt Groupe. He continued, “...because people aren’t complaining. If you were making enough changes, I’d hear more people complaining about you.” It was this ironic moment that gave birth to SecurityScorecard as I realized that companies have no KPIs to know how they’re doing on the cybersecurity front.

Navigating Change Results - The CISO and CTO View

The Results are In Diverse approaches, but consistent cost savings. Our latest research shows European CIO and CISO intentions and practices at a time of huge security and networking change. See the key findings, dig into the results and hear analysis of what it all means directly from our EMEA CISO Neil Thacker and VP Vice President, Sales Engineering, EMEA/LATAM, Andy Aplin. What does network and security transformation mean in practice for teams, budgets, skills and suppliers? View our video & infographic for the key headlines – then request our Ebook for the full picture.

Zero Trust for State and Local Government

The cybersecurity threat landscape is shifting rapidly. More than 400 ransomware attacks have hit city and county governments in the United States since 2016, crippling vital government services for weeks at a time. Those are only the publicly reported instances – the actual number is likely exponentially higher, and these attacks are growing increasingly sophisticated. Meanwhile, high-profile threats to dams, electrical grids and other facilities, including the Colonial Pipeline attack this year, have shown the vulnerability of America’s critical infrastructure.

Things to Ask Your SSE Vendor: Episode 2: Can You Securely Connect to AS400 via Agent and Agentless?

Not every application running in your environment will be a "modern" one. Many companies still use crown-jewel applications like AS400. The best SSE platforms can use zero trust network access (ZTNA) to securely access AS400 - not only when an agent is deployed on the device, but also through an agent-less RDP session as well. Can your SSE vendor do that?

Unified Security for a Reconnecting World

During the last year we have been more connected than ever. We have adapted to a new way of life and found new ways to overcome the distance and physical isolation from our colleagues through digital connectedness. The world will continue to evolve and we will adapt with you in every step of the way protecting your business wherever you are.

Ep 5 Securing the digital supply chain - Sai Kalur

In this episode of Securing the digital supply chain we talk to one of the luminary stars in IT, security from the Bay Area - Sai Kalur. Sai talks about SDLC, software development processes, best practices, the considerations that drive pharma and health-tech companies. A great discussion for CISOs, CIOs, and security thought leaders.

DDoS Protection With AppTrana

For any business, AppTrana (Web Application Firewall) for DDoS Protection is an essential tool to strengthen the security posture. With this WAF tool, CXOs (CISO, CTO, CISO, CEO) would have their tough jobs made easier in this ever-growing threat landscape. (In recent years, with the adoption of the work-from-home culture, cybersecurity attacks have taken the front seat in disrupting businesses of all sizes across the world).