Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

How to Recover a Full VMware vSphere VM From a Backup

NAKIVO Backup & Replication proporciona múltiples opciones de recuperación para máquinas virtuales VMware vSphere, permitiendo una rápida restauración de las operaciones normales de negocio en caso de interrupciones o pérdida de datos. Siga los pasos de este vídeo para aprender a recuperar completamente una máquina virtual VMware vSphere a partir de un backup existente utilizando NAKIVO Backup & Replication.

BDRSuite Overview - Data Backup and Recovery solution

BDRSuite is a comprehensive and most cost-effective Backup and Disaster Recovery Software designed to protect Virtual Machines (VMware, Hyper-V, KVM, oVirt, Proxmox), Servers (Windows, Linux, NAS), Endpoint (Windows, Linux, Mac), SaaS Applications (Microsoft 365, Google Workspace), Cloud Workloads (AWS, Azure), and Applications & Databases (Microsoft Exchange Server, SQL Server, SharePoint, MySQL, PostgreSQL)

Understanding AI Package Hallucination: The latest dependency security threat

In this video, we explore AI package Hallucination. This threat is a result of AI generation tools hallucinating open-source packages or libraries that don't exist. In this video, we explore why this happens and show a demo of ChatGPT creating multiple packages that don't exist. We also explain why this is a prominent threat and how malicious hackers could harness this new vulnerability for evil. It is the next evolution of Typo Squatting.

The NFL's George Griesler on securing the Super Bowl and reducing risk through collaboration

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by George Griesler. George has been working in cybersecurity since 1997, when he assumed the role of Senior Network administrator at the United States Golf Association (USGA), eventually advancing to Director of Information Security. He currently serves as the Senior Director of Cybersecurity at the National Football League (NFL), where he works to secure events like the Super Bowl, which in 2024 was the most-watched telecast ever.

How to choose the Best Node.js Docker Image

Today we walk through the best options for your Node.js Docker Image, how to avoid common pitfalls and mistakes, and the best ways to strengthen the security of your projects effectively. ⏲️ Chapters ⏲️ ⚒️ About Snyk ⚒️ Snyk helps you find and fix vulnerabilities in your code, open-source dependencies, containers, infrastructure-as-code, software pipelines, IDEs, and more! Move fast, stay secure.

Shamane Tan on rising up - Cyber Security Decoded

Inspirational words from Shamane Tan on Cyber Security Decoded…as you climb your personal ladder to success, you should be your biggest cheerleader! There won’t always be someone there to recommend you for promotions or point you in the right direction. People come and go, and opportunities arise and vanish. That’s why in order to grow, whether it’s in the #CyberSecurity industry, the broader #Technology industry, or elsewhere, you must always be proactive in seeking out new ways to grow personally and professionally!

Nightfall AI: The First AI-Native Enterprise DLP Platform

Legacy DLP solutions never worked. They're point solutions that generate an overwhelming number of false positive alerts, and block the business in the process. But no longer. Enter: Nightfall AI, the first AI-native enterprise DLP platform that protects sensitive data across SaaS, generative AI (GenAI), email, and endpoints, all from the convenience of a unified console.

Unlocking the Future: Facial Recognition & Biometrics

Dive into the world of Facial Recognition and Biometrics with us! 🌐✨ This video explores the cutting-edge technology of facial recognition and its integration with biometric data for seamless, contactless access. ✨🔐 From enhancing security to ensuring privacy, discover how artificial intelligence is revolutionizing the way we interact with technology. But it's not all about convenience; we also delve into the critical aspects of privacy and security considerations. 🔒💡