Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

How CyberArk Scaled SaaS Transformation: Insights from SVP Corporate Finance Nili Serr-Reuven

Discover how CyberArk's transformation into a SaaS company reshaped its business and finance operations. SVP Nili Serr-Reuven shares insights on scaling a SaaS delivery model, the critical role of finance in transformation, and lessons learned along the way. Tune in for expert advice on driving growth and innovation in the SaaS space.

[PCI DSS Requirement 9] : Summary of Changes from Version 3.2.1 to 4.0 Explained

Are you curious about the updates in PCI DSS Requirement 9 as we transition from Version 3.2.1 to 4.0? Requirement 9 focuses on physical security, a cornerstone of safeguarding cardholder data. With PCI DSS 4.0, new best practices, enhanced clarity, and updated guidelines have been introduced to address emerging threats and challenges. Whether you're an IT professional, QSA, or just starting your PCI DSS compliance journey, this video is packed with insights to help you stay ahead.

Falcon Data Protection AI-Powered Anomaly Detections: Demo Drill Down

Sensitive data handling often risks accidental exposure. CrowdStrike Falcon Data Protection, part of the powerful CrowdStrike Falcon platform, uses AI-driven anomaly detection to prevent unauthorized data transfers. In this demo, see how quickly Falcon identifies and blocks an attempted transfer of customer PII to a personal Google Drive, generating real-time alerts to help security teams act fast.

What is active directory and why is it on an attackers radar?

In the past year, 85% of organizations have experienced an Active Directory attack. To strengthen your security posture and defend your AD, you need to what attackers are looking for. In this video,'s experts give you an insight into what exactly is Active Directory and what makes it such a lucrative target for cyber attackers.