Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Keeper 101 | Enterprise - Keeper Connection Manager With Remote Browser Isolation On-premise

Keeper Connection Manager, is a Zero-Knowledge and Zero-Trust platform that provides instant, secure and effortless access to your infrastructure and desktops from any device. Keeper Connection Manager is an agentless remote desktop gateway that can be installed in any on-premise or cloud environment. Keeper Connection Manager was built by the original creators of Apache Guacamole, a widely used open source remote access gateway with millions of installs. Guacamole's proven technology and active development community provides customers with a high level of trust.

Microsoft Recall: Detecting Abuse | Threat SnapShot

You've probably heard of Microsoft's new Recall feature by now. It's a info stealer's dream come true. There has been a lot of information release about how this new feature is a security nightmare and how it works. But today we are going to dig in and discover how to actually detect abuse of this new feature.

Celebrating 10 years of Project Galileo (with Alissa Starzak)

Alissa Starzak, Global Head of Policy at Cloudflare, about our Project Galileo that is celebrating 10 years. In June 2014, Cloudflare launched Project Galileo, a program which today provides security services, at no cost, to more than 2,600 independent journalists and nonprofit organizations around the world supporting human rights, democracy, and local communities.

Next Steps for Ecosystem-level Cybersecurity | Drew Bagley, VP & Counsel of Privacy & Cyber Policy

A daily onslaught of significant breaches means policymakers are often forced into crisis response. For decades, this has led to an overwhelming focus within the community on tactical issues and relatively less attention on strategic ones. Fortunately, however, policymakers are increasingly considering cyber risk holistically and are attempting to proactively drive systemic changes.

No More Backdoors Know Who Has Access to What, Right Now

With threat actors able to breach and pivot to sensitive resources in less than 62 minutes, the security of your infrastructure depends on the ability to quickly identify who has access to what. This webinar introduces infrastructure professionals to Teleport Policy, the most recent addition to the Teleport Access Platform. Teleport Policy provides a visually rich view of access relationships and the tools to quickly uncover and remediate long-standing privileges and shadow or risky access paths.

Transparency and Ethics in AI: Ensuring Safety and Regulation

In this video, Erin Mann delves into the critical importance of transparency and ethics in the use of artificial intelligence (AI). As AI continues to evolve and integrate into various aspects of our lives, ensuring its ethical use and safety becomes paramount. Erin discusses how transparency in AI operations can drive the necessary conversations around regulation and efficient implementation. By understanding the ethical implications and advocating for clear guidelines, we can harness the power of AI responsibly and effectively.