Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Agent Impact on Endpoints - Tanium Agent FAQs - Tanium Tech Talks #88

Often we get the question, “What is the impact of the Tanium agent on the endpoint?” Today we’re going to unpack that answer as part of a series on optimizing the Tanium agent for your environment. In this series we’re going to explore expectations for endpoint agent load, look at agent tuning, talk about proper anti-virus exclusions, what to consider for virtual infrastructure, and more. Today we’re going to focus on the baseline load of the Tanium agent on your endpoints: disk, memory, CPU, network.

Virtual Endpoints (VDI & VMs) - Tanium Agent FAQs - Tanium Tech Talks #90

How do I tune Tanium for virtual infrastructure like VMs and VDI? Many folks who have worked in IT ops are familiar with the struggle of keeping virtual infrastructure properly resourced with memory, disk, CPU, and network. Sometimes it’s a balancing act of hardware, budget, and virtual machines. Now you’re deploying a real time agent on every guest on those virtual hosts, so how can we make sure it doesn’t create a resource storm?

One Identity named leader in 2024 KuppingerCole Leadership Compass

Larry Chinski, One Identity VP of Corporate Strategy, explains why One Identity has been recognized as a leader in the 2024 KuppingerCole Identity Fabrics Leadership Compass. This validates that One Identity’s functional convergence and integration of privileged access management, access management, identity governance and administration and Active Directory management is setting the standard in the market.

AI Awareness Gap: Bridging the Disconnect Between Tech Experts and the Public | Razorthorn Security

Amy Stokes-Waters sheds light on the disconnect between technology enthusiasts and the general public's interest in tech, specifically AI advancements. In this engaging clip, Amy discusses the challenge of communicating complex tech concepts, like AI-generated content, to those outside the IT sphere. She emphasizes the need for better education on technologies that are reshaping our media landscape. Dive into this discussion to understand why simplifying tech talk is essential for broader awareness and acceptance.

Third Party Exclusions - Tanium Agent FAQs - Tanium Tech Talks #89

My endpoints have other agents beside Tanium. How do I get them to play well together? The onboarding checklist for every new Tanium customer includes a step on third party agent exclusions. Most IT shops have anywhere from 5 to 15 agents running on their servers and workstations, everything from antivirus to data loss prevention. So how can we make sure that Tanium functions well alongside those other agents? This is the next installment in our Tanium Agent FAQ series.

Unrealistic Cybersecurity Job Expectations: The Talent Gap Issue | Razorthorn Security

Amy Stokes-Waters critiques the unrealistic expectations in cybersecurity job descriptions, highlighting a significant industry challenge. Discover why demanding expertise in both SOC operations and pen testing for a single role, with insufficient compensation, exacerbates the talent gap. This clip exposes the harsh realities of the cybersecurity job market and the need for more realistic hiring practices to attract and retain skilled professionals.

Revolutionizing Security: The Digital Transformation Journey

In today's rapidly evolving world, the shift towards digital solutions in security is not just a trend but a necessity. Join us as we dive deep into the heart of digital transformation in security with Neerja Bajaj, a visionary in the field. 💼🛡️ Discover how cutting-edge technologies are reshaping the way we manage and secure spaces, offering unprecedented levels of efficiency and safety. From smart access control to integrated security ecosystems, learn how these innovations are paving the way for a safer, smarter future. 🚀📈