Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Webinar

Top 5 Myths About API Security and What To Do Instead

Discover the top five myths about API security and learn the effective strategies for protecting your digital assets. Understand why attacks are common, the limitations of perimeter security, and the importance of a zero trust model in this comprehensive overview. Uncover the realities of API security, from the prevalence of attacks to the challenges of relying on perimeter defenses. Learn why a zero trust approach and better developer engagement are key to robust API protection.

The IT Hour | Microsoft Store Integration! 04.12.24

Josh Roland, Product Manager, joins us to talk about the latest improvement in Software Management for Windows. Join us at 11:30 am ET. The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable. You can expect from our weekly conversations.

Top Security Threats Worldwide Q4 2023

Join WatchGuard CSO Corey Nachreiner and Director of Security Operations Marc Laliberte as they discuss key findings from the WatchGuard Threat Lab’s Q4 2023 Internet Security Report. They’ll cover the latest malware and network attack trends targeting small and midsized enterprises and defensive tips you can take back to your organization to stay ahead of modern threat actor tactics.

Remediating Mars' Cloud Security Risks with Wiz & Tines

93% of security practitioners believe that more automation would improve the work they produce. Join us as we explore how Mars used Tines & Wiz to identify and remediate security risks within their cloud infrastructure with automated workflows. Along with insights on how to leverage Tines and Wiz, webinar attendees will hear directly from Mars about the impact these platforms have had on their business resilience and security culture.

Navigating the SecOps Cloud Platform Revolution for Enterprise SOCs

In a world where digital transformation has become the norm, cybersecurity professionals face unprecedented challenges. The traditional approach of managing dozens of disparate point solutions and siloed security tools, while attempting to control costs, is no longer sufficient. It's time to embrace a new era of cybersecurity in the SecOps Cloud Platform – one that treats cybersecurity as a set of capabilities much like how cloud providers did for IT. We challenge you to question the status quo and to open your mind a new way of thinking about security operations.

(Re)Discover the Hidden Value of Single Sign-On

There is no better time to (re)discover the hidden value of single sign-on as part of your journey to zero trust. Single sign-on (SSO) combines simplicity with security by removing friction for users to access applications and reducing the administrative overhead and risks for IT associated to password management.

Graylog V6 and SOC Prime: Cyber Defense with MITRE Framework Webinar

Insights from Graylog and SOC Prime Join us for an exclusive session where we unveil the integrations between Graylog, a comprehensive log management solution, and SIEM, and SOC Prime’s Platform for collective cyber defense. Discover how integrating these solutions transforms your approach to security, providing a robust foundation for crisis management and resilience against cyber threats.

ITAM & CMDB - EXPRESS - ServiceNow Integration - Tanium Tech Talks #85

See how Tanium can feed your ServiceNow CMDB with fresh asset inventory on today's Tanium Tech Talk. We're going to start at the beginning with asset data: hardware, software, usage, and more. Many Tanium customers update their ServiceNow CMDB multiple times per day to enjoy the benefits of accurate and timely asset data.

ITSM Walkthrough - EXPRESS - ServiceNow Integration - Tanium Tech Talks #86

See how to configure the Tanium integration for powering the ServiceNow service desk experience with real-time visibility and control on today's Tanium Tech Talk. Watch the guided setup, take note of implementation considerations, plan for user permissions, and do more with the info in this video. VIDEOS IN THIS SERIES CHAPTERS.