Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

AI-driven Security Analytics: Attack Discovery Demo

Powered by the Elastic Search AI platform, Attack Discovery triages hundreds of alerts down to a few attacks that matter. Elastic’s AI-driven security analytics is built on the Search AI platform, which includes RAG powered by the industry's foremost search technology. The traditional SIEM will be replaced by an AI-driven security analytics solution for the modern SOC. Additional Resources.

Falcon NG-SIEM AI Assisted Investigation: Demo Drill Down

With today's adversaries moving faster than ever, you need an AI-Native platform to stay one step ahead. Watch to learn how Falcon NG-SIEM platform simplifies investigations and uncovers adversaries with ease. CrowdStrike Falcon Next-Gen SIEM: Consolidate security operations with the world’s most complete AI-native SOC platform.

Falcon NG-SIEM Streamline The SOC: Demo Drill Down

When adversaries infiltrate your organiztion you can leverage AI to speed up the investigation time and how you can leverage automation to respond to attacks. Watch to learn how NG-SIEM allows you to streamline your SOC. CrowdStrike Falcon Next-Gen SIEM: Consolidate security operations with the world’s most complete AI-native SOC platform.

Verizon DBIR Breakdown - The 443 Podcast, Ep. 289

📽️ 🔊 This week on #the443podcast, Corey Nachreiner and Marc Laliberte cover the key takeaways from the 2024 Verizon Data Breach Investigations Report. Before that, they discuss what we learned from United Healthcare CEO Andrew Witty’s congressional testimony on their ransomware attack in February. Corey and Marc end with a discussion on a research article from JFrog on malicious Docker Hub repositories.

One Identity named leader in 2024 KuppingerCole Leadership Compass

Larry Chinski, One Identity VP of Corporate Strategy, explains why One Identity has been recognized as a leader in the 2024 KuppingerCole Identity Fabrics Leadership Compass. This validates that One Identity’s functional convergence and integration of privileged access management, access management, identity governance and administration and Active Directory management is setting the standard in the market.

Unrealistic Cybersecurity Job Expectations: The Talent Gap Issue | Razorthorn Security

Amy Stokes-Waters critiques the unrealistic expectations in cybersecurity job descriptions, highlighting a significant industry challenge. Discover why demanding expertise in both SOC operations and pen testing for a single role, with insufficient compensation, exacerbates the talent gap. This clip exposes the harsh realities of the cybersecurity job market and the need for more realistic hiring practices to attract and retain skilled professionals.