Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Unlocking Seamless Security: Neerja Bajaj's Guide with Brivo

In today's fast-paced world, ensuring the security and efficient management of our workspaces is more crucial than ever. Join Neerja Bajaj as we dive into the transformative world of Brivo, a platform at the forefront of redefining security administration. 🚀 Discover how Brivo is crafting a unified experience for security levels and management, enabling comprehensive building management that empowers employees without becoming an obstacle.

Full VM Recovery: Steps to restore your Virtual Machines completely

Full VM recovery can restore an entire virtual machine (VM) to its original state from a backup. It involves recovering all the VM’s components, including the operating system, applications, configurations, and data. With the Full VM Recovery option, you can restore the backup virtual machine/VM Template data to the same or different VMware host/server exactly in the same state as it was during the backup.

CYJAX Webinar | Threat Intelligence Spotlight Navigating the EU Digital Operational Resilience Act

Join Ian Thornton-Trump CD, CISO for Cyjax, as he illuminates a strategic path forward by advocating for an intelligence-led approach to DORA compliance. Discover how leveraging threat intelligence can expedite your journey towards DORA compliance, ensuring a resilient and future-ready organisational framework.

Perspective-Driven Probability: Simplifying Risk Assessment with FAIR Methodology

Explore the nuanced nature of probability and risk assessment in this insightful video. Join us as we navigate the diverse perspectives that shape individual interpretations of what's probable. Discover how the FAIR (Factor Analysis of Information Risk) methodology provides a structured approach to understanding and communicating risk, making it accessible not only to the creator but to a wider audience. Gain insights into the challenges of assigning probabilities to uncertain events with limited data, and learn how FAIR methodology offers clarity in the face of uncertainty.

A06 Vulnerable and Outdated Components - OWASP TOP 10

Outdated software components are a hacker's best friend. Learn about the dangers of A06:2021 (formerly known as "Using Components with Known Vulnerabilities") in the OWASP Top 10. This threat just climbed the ranks – let's get you up to speed! In this video, we'll tackle.