Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Many sources, one truth: Applying DevSecOps best practices

It’s no secret threat actors, and cloud attacks have evolved, yet traditional security responses have languished, much to the detriment of many organizations. In this session, Cas Clawson, Field CTO for Security at Sumo Logic, will explore cloud threat detection challenges and how to do it better using a real-world incident response example, leveraging a single source of truth, breaking down team silos, and utilizing the best practices with DevSecOps.

Preparing for PCI SSF Assessments and Audits Tips and Strategies

Welcome to our latest webinar recording on “Preparing for PCI SSF Assessments and Audits Tips and Strategies”, presented by VISTA InfoSec. This webinar provides an in-depth understanding of the Payment Card Industry Software Security Framework(PCI SSF) assessment and how to conduct audits and address the unique security challenges associated with software development and maintenance in the payment card industry.

Implications of AI in a modern defense strategy

In today's rapidly evolving landscape of cybersecurity, the integration of artificial intelligence (AI) presents both unprecedented opportunities and complex challenges. Understanding the implications of AI in modern defense strategies is paramount for organizations seeking to safeguard their digital assets against emerging threats. In this Q&A, Chas Clawson, Sumo Logic's Field CTO, Security, shares insights on defending against AI-enabled adversaries and how to integrate AI-driven technologies into security strategies and frameworks.

Falcon for IT Ask Any Question, Get Instant Answers: Demo Drill Down

As IT environments grow increasingly complex, the challenge of maintaining system security and software up-to-date becomes critical. CrowdStrike Falcon® for IT addresses these challenges by offering a unified platform with a single console architecture for real-time monitoring and threat remediation across diverse operating systems. This demo highlights Falcon for IT's capability to instantly identify and address vulnerabilities in software packages, using the example of managing updates for XZ-Utils across a Linux fleet.

See Falcon Foundry in Action

With cybersecurity tool sprawl on the rise, CrowdStrike Falcon® Foundry allows you to easily build no-code applications that operate as an extension of the CrowdStrike Falcon platform, allowing your team to consolidate dozens of point products. With access to a no-code app development platform and the same CrowdStrike data and infrastructure, your team will be able to build custom apps to solve the toughest cybersecurity challenges and stop adversaries.

Random but Memorable - Episode 12.7: Zero Trust Fall Out with Dr. Chase Cunningham & Elliot Volkman

Think you know what zero trust is? Think again! This week, we welcome Dr Chase Cunningham & Elliot Volkman to the show to define what the zero trust security model looks like and debunk common misconceptions around it. Tune in, as we dive into how you can adopt zero trust in your organization, and deploy it successfully.

The 443 Podcast - Episode 289 - The 2024 Verizon DBIR

This week on the podcast, we cover the key takeaways from the 2024 Verizon Data Breach Investigations Report. Before that, we discuss what we learned from United Healthcare CEO Andrew Witty's congressional testimony on their ransomware attack in February. We also discuss a research article from JFrog on malicious Docker Hub repositories. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.