Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Graylog V6 and SOC Prime: Cyber Defense with MITRE Framework Webinar

Insights from Graylog and SOC Prime Join us for an exclusive session where we unveil the integrations between Graylog, a comprehensive log management solution, and SIEM, and SOC Prime’s Platform for collective cyber defense. Discover how integrating these solutions transforms your approach to security, providing a robust foundation for crisis management and resilience against cyber threats.

Controversy and Criticism: Navigating Resistance to Cyber Risk Clarification | Razorthorn Security

Dive into the contentious realm of cyber risk clarification in this eye-opening video. Explore the challenges faced by proponents of risk assessment methodologies as they encounter resistance from influential figures in the industry. Hear about the shocking experiences of individuals who have been met with accusations of criminal negligence simply to advocate for clearer risk communication. Despite the pushback, join us as we navigate through the discourse and strive to shed light on the importance of cyber risk understanding and mitigation.

Navigating the SecOps Cloud Platform Revolution for Enterprise SOCs

In a world where digital transformation has become the norm, cybersecurity professionals face unprecedented challenges. The traditional approach of managing dozens of disparate point solutions and siloed security tools, while attempting to control costs, is no longer sufficient. It's time to embrace a new era of cybersecurity in the SecOps Cloud Platform – one that treats cybersecurity as a set of capabilities much like how cloud providers did for IT. We challenge you to question the status quo and to open your mind a new way of thinking about security operations.

LimaCharlie's SecOps Cloud Platform - Security Beyond Limits

Your reality is frustrating. It's diminishing your potential. You're going through the same old motions, trying to bridge the same old gaps. Because it's always been just the way things are. You’re walled in by a lack of creativity. Caged by a reality where traditional tools stifle the freedom to excel. What if we could smash through the walls of our broken reality? Reach out and grasp a whole new way of managing SecOps. With better tools, security, and technology.

Unlocking the Future: Seamless Security & Smart Building Management

Dive into the world of frictionless entry and smart building management with us at Brivo! In this video, we explore how cutting-edge technology can transform your experience with seamless access, enhanced security, and optimized space utilization. 🔄💡 Discover the power of data in creating safer, more efficient environments and see how Brivo is leading the charge in innovative security solutions. 📊🔑

Filter and prioritize IAST vulnerability findings using Project Views in Seeker | Synopsys

In this video, Product Manager, Scott Tolley shows how setting up the new Project Views feature in Seeker can help developers focus their time and attention on the most relevant vulnerability findings in running applications– without hiding the full details from security team. This new feature lets security and development teams...

Becoming A Secure API First Company

Join Nick Rago (VP of Product Strategy at Salt Security) and Claudio Acquaviva (Software Architect of Kong Inc.) in this informative webinar (live April 11). They discuss what being API-first really means, the essentials to success, and walkthrough the lifecycle of an API from design to deployment and how combining Salt Security with Kong through that API lifecycle can help provide a risk-free API-first journey.