Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Next Steps for Ecosystem-level Cybersecurity | Drew Bagley, VP & Counsel of Privacy & Cyber Policy

A daily onslaught of significant breaches means policymakers are often forced into crisis response. For decades, this has led to an overwhelming focus within the community on tactical issues and relatively less attention on strategic ones. Fortunately, however, policymakers are increasingly considering cyber risk holistically and are attempting to proactively drive systemic changes.

No More Backdoors Know Who Has Access to What, Right Now

With threat actors able to breach and pivot to sensitive resources in less than 62 minutes, the security of your infrastructure depends on the ability to quickly identify who has access to what. This webinar introduces infrastructure professionals to Teleport Policy, the most recent addition to the Teleport Access Platform. Teleport Policy provides a visually rich view of access relationships and the tools to quickly uncover and remediate long-standing privileges and shadow or risky access paths.

ImmuniWeb MobileSuite | Mobile Application Penetration Testing

ImmuniWeb MobileSuite leverages our award-winning Machine Learning technology to accelerate and enhance mobile penetration testing. Every pentest is easily customizable and provided with a zero false-positives SLA. Unlimited patch verifications and 24/7 access to our security analysts are included into every project.

Cyber Alert, Ep. 1 | Seattle Kraken | WatchGuard Technologies

If you're protecting the net for an NHL franchise or being the last stop for your IT team, vigilance is key. Join Philipp Grubauer, goaltender for the Seattle Kraken, as he teams up with the Kraken IT team to block cyber threats and keep systems secure. Just like on the ice, when duty calls, you've got to respond fast!

What Really Grinds My Gears In Infosec!

Welcome to Razorwire! Join me, Jim, and my guests Chris Dawson and Iain Pye, as we dive into the daily frustrations and pressing issues facing cybersecurity professionals. This episode is filled with insights, gripes, and laughable clichés that saturate our industry. From award ceremony hype to exaggerated LinkedIn credentials, we tackle it all. Stay tuned and subscribe for a candid look at the ups and downs of working in infosec.

Ultimate Protection: CyberArk Secure Browser & Proofpoint Anti-Phishing Integration | CyberArk

Discover the next level of web security with the CyberArk Secure Browser! In this video, we dive into the powerful features of CyberArk's Secure Browser, designed to provide: Granular Policy Controls Data Exfiltration Prevention Session Monitoring Credential Security Privacy Enforcement But that's not all! We also explore how combining CyberArk's Secure Browser with Proofpoint's industry-leading anti-phishing capabilities offers users comprehensive, real-time protection against phishing sites attempting to steal credentials and sensitive data.