Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Random but Memorable - Episode 8.8: Secret Agency Space Nerds with Jason Meller from Kolide

Find out how a researcher uncovered a secret German intelligence agency using an Apple AirTag, and how Ozzy Osbourne's (yes, you read that right) NFT project turned into a scam – all in this episode’s Watchtower Weekly. We also invite Kolide CEO and founder, Jason Meller, to discuss user-first endpoint management, empowering the end-user, and creating a culture of security. Plus, Anna gets revenge in Ridiculous Requirements: Capital City edition! 🏙

Understanding Broken Authentication and Session Management

This video is all about understanding broken authentication and session management. You'll learn the difference between HTTP and HTTPS, what it means to "authenticate" a user, how sessions work, and much more!#brokenauthentication #sessionmanagement Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.

How to Use the Snyk CLI to Fix Vulnerabilities in Your Application: The Big Fix

Brian Vermeer, Developer Advocate at Snyk, demonstrates how you can use the Snyk CLI to fix vulnerabilities in your application. Join us for The Big Fix, an event that brings developers and security practitioners round the world to find and fix vulnerabilities. Let's make the Internet a safer and better place than before!

Identity Access Management (IAM) Automation - Intro to Torq Webinar

Security teams are struggling to keep up with the increasing number of attack surfaces and the demands on remediating those attack surfaces in real-time. Security automation is the key to unlocking your security team’s productive potential, but traditional SOAR platforms (Security Orchestration, Automation, and Response) are complex and can take months of development to implement your first automation response sequence.

Evaluating Your Content Management Maturity

In this video, Egnyte’s Director of Value Realization, Karl Becker breaks down content from an AEC perspective. He covers: What is content? Why effectively managing it is so important What are some of the benefits of effectively managing content Becker and his team work with thousands of Egnyte clients and have developed a content maturity model to help them get the most out of their content, no matter where they are on their content journey.

New Year, New Features in Xray

Let’s start 2022 off the right with new features and updates that will extend JFrog Xray’s power and reach in addressing challenges with securing your binaries from development to production. Join Sarit Tager, VP Product Security as she discusses how Xray provides intelligent supply chain security and compliance at DevOps speed. JFrog Xray is a software composition analysis (SCA) solution that scans your open source software (OSS) dependencies for security vulnerabilities and license compliance issues.