Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Virtual Endpoints (VDI & VMs) - Tanium Agent FAQs - Tanium Tech Talks #90

How do I tune Tanium for virtual infrastructure like VMs and VDI? Many folks who have worked in IT ops are familiar with the struggle of keeping virtual infrastructure properly resourced with memory, disk, CPU, and network. Sometimes it’s a balancing act of hardware, budget, and virtual machines. Now you’re deploying a real time agent on every guest on those virtual hosts, so how can we make sure it doesn’t create a resource storm?

AI Awareness Gap: Bridging the Disconnect Between Tech Experts and the Public | Razorthorn Security

Amy Stokes-Waters sheds light on the disconnect between technology enthusiasts and the general public's interest in tech, specifically AI advancements. In this engaging clip, Amy discusses the challenge of communicating complex tech concepts, like AI-generated content, to those outside the IT sphere. She emphasizes the need for better education on technologies that are reshaping our media landscape. Dive into this discussion to understand why simplifying tech talk is essential for broader awareness and acceptance.

Leading the charge: One Identity's 2024 recognitions and market leadership

Larry Chinski, One Identity VP of Corporate Strategy, announces two prestigious recognitions One Identity has received in 2024. As the market shifts towards a holistic approach to cybersecurity, consolidating fragmented cybersecurity silos is top-of-mind for many organizations, and One Identity is proud to be leading the charge.

One Identity named leader in 2024 KuppingerCole Leadership Compass

Larry Chinski, One Identity VP of Corporate Strategy, explains why One Identity has been recognized as a leader in the 2024 KuppingerCole Identity Fabrics Leadership Compass. This validates that One Identity’s functional convergence and integration of privileged access management, access management, identity governance and administration and Active Directory management is setting the standard in the market.

Revolutionizing Security: The Digital Transformation Journey

In today's rapidly evolving world, the shift towards digital solutions in security is not just a trend but a necessity. Join us as we dive deep into the heart of digital transformation in security with Neerja Bajaj, a visionary in the field. 💼🛡️ Discover how cutting-edge technologies are reshaping the way we manage and secure spaces, offering unprecedented levels of efficiency and safety. From smart access control to integrated security ecosystems, learn how these innovations are paving the way for a safer, smarter future. 🚀📈

Secure Your IoT: Mastering Conscious Interaction with John Szczygiel

Dive deep into the world of IoT security with John Szczygiel as we explore the critical importance of conscious interaction between hosts and panels. In today's digital age, ensuring the safety of your IoT devices is not just a necessity; it's a responsibility. Join us at Brivo as we uncover the secrets to maintaining robust security protocols and learn how to protect your smart spaces from potential threats. Don't miss out on this insightful journey into the heart of IoT security. Remember, knowledge is power, especially when it comes to safeguarding your digital world. 🚀🔒

Falcon for IT Ask Any Question, Get Instant Answers: Demo Drill Down

As IT environments grow increasingly complex, the challenge of maintaining system security and software up-to-date becomes critical. CrowdStrike Falcon® for IT addresses these challenges by offering a unified platform with a single console architecture for real-time monitoring and threat remediation across diverse operating systems. This demo highlights Falcon for IT's capability to instantly identify and address vulnerabilities in software packages, using the example of managing updates for XZ-Utils across a Linux fleet.

Falcon Cloud Security Cloud Detection and Response

Discover how CrowdStrike Falcon Cloud Security tackles cloud misconfigurations and vulnerabilities in this concise demo. Witness our Cloud Detection and Response in action as we identify and mitigate a sophisticated attack by FANCY BEAR, providing clear visibility and critical insights into your multi-cloud deployments. Learn how our integrated threat intelligence and rapid response capabilities help enforce compliance and secure your cloud environment.