Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

What Really Grinds My Gears In Infosec!

Welcome to Razorwire! Join me, Jim, and my guests Chris Dawson and Iain Pye, as we dive into the daily frustrations and pressing issues facing cybersecurity professionals. This episode is filled with insights, gripes, and laughable clichés that saturate our industry. From award ceremony hype to exaggerated LinkedIn credentials, we tackle it all. Stay tuned and subscribe for a candid look at the ups and downs of working in infosec.

Ultimate Protection: CyberArk Secure Browser & Proofpoint Anti-Phishing Integration | CyberArk

Discover the next level of web security with the CyberArk Secure Browser! In this video, we dive into the powerful features of CyberArk's Secure Browser, designed to provide: Granular Policy Controls Data Exfiltration Prevention Session Monitoring Credential Security Privacy Enforcement But that's not all! We also explore how combining CyberArk's Secure Browser with Proofpoint's industry-leading anti-phishing capabilities offers users comprehensive, real-time protection against phishing sites attempting to steal credentials and sensitive data.

Adding Windows Devices | JumpCloud University Tutorial (2024)

In this tutorial, we'll cover how to add your company's Windows devices to your JumpCloud directory leveraging the JumpCloud agent. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.

Mastering IAM: Market trends & key insights for your project

Join us for the first installment of a three-part webinar series presented by Intragen and OneLogin. Stuart Sharp, VP of OneLogin Product Strategy at One Identity, and Kalle Niemi, Lead Business Consultant at Intragen, dive into the identity and access management (IAM) market. They explore how companies should approach access management projects and cover latest trends and developments in identity security, how to craft an elevated IAM strategy and where the IAM market is headed.

Secure Your Digital Environment with CyberArk & Votiro

Welcome to our channel! In this video, we delve into how the combined strengths of CyberArk and Votiro provide a comprehensive solution to safeguard your organization against cyber threats targeting web browsing and file content. Key Benefits: By integrating CyberArk and Votiro, your organization can enjoy a secure digital environment without compromising on user productivity or business continuity. Stay protected and efficient with our holistic cybersecurity solution.

Netwrix PolicyPak

In today's hybrid work environment, users need to access their desktops, laptops and other devices at the office, at home, while traveling, through kiosks and virtually. But many organizations are struggling to manage and secure their IT ecosystem because not all Windows endpoint management software systems were designed for modern distributed scenarios. Netwrix PolicyPak enables you to solve your endpoint management and endpoint protection challenges wherever users get work done, modernizing and extending the power of your existing enterprise technology assets.

Unlocking Flexibility with Brivo: The Ultimate Solution for Any Location

Discover how Brivo is revolutionizing security and access control across diverse environments, from bustling factories to serene oil rigs. With over two decades of innovation, Brivo stands as the global leader in cloud-based access control and smart space technology. Whether you're managing a small business or overseeing a large enterprise, Brivo's flexible system is designed to meet your unique needs, ensuring safety and efficiency. Dive into our video to explore the endless possibilities with Brivo's adaptable solutions.