Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Using the Responder Sweep Tool

The responder - or sweep sensor functionality - is designed for incident responders or any one else trying to get the ground truth on a box. With one click of a button you can get list of processes and modules, a list of any unsigned binary code, autoruns, services, drivers, network connections, which sockets are listening on which ports and what is active on the network. It will also look for hidden modules or any indicators that are new to your organization.

Introducing Kroll's Third-Party Notification Platform

Kroll’s third-party breach management platform cuts through the complex logistics of coordinating breach notification for a compromised entity and the consumer-facing organizations with which they work. Watch this video to see how we help clients navigate through the complexities of breach notifications with third-parties.

Transform your Data Center with Confidence | Joint Webinar by CloudFabrix and Verge.io

Verge.io is partnering with CloudFabrix, a leader in artificial intelligence for IT operations, to chat about why software-defined everything is the way to go. This is a great opportunity to learn how to transform your current data center operations using the latest technology and intelligence. Here’s what we’ll cover: – How artificial intelligence and data center virtualization operating systems work together to change the thinking around traditional data centers.

SQL Injection explained in 1 minute

SQL injection, also known as SQLi, is one of the most dangerous vulnerabilities for online applications. It's a common method used by attackers to manipulate and access database information that would otherwise not be displayed or provided to the website user. In this video, you'll learn what SQL injection is and why you should be aware of it.