Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Introducing Time-Limited Access

As an enhancement to Keeper’s secure sharing capabilities, Time-Limited Access allows you to securely share credentials or secrets with other Keeper users on a temporary basis, automatically revoking access at a specified time. Time-Limited Access prevents long standing privileges and ensures that information is removed from the recipient’s vault, greatly reducing the risk of unauthorized access. Time-Limited Access brings several key benefits to users and administrators.

Unlocking the Future: The Journey to Biometric Security with Brivo

In today's fast-paced world, security is more important than ever. But with great security comes great responsibility – and sometimes, complex processes. Join us at Brivo as we dive deep into the world of biometric security, exploring the intricate journey of enabling biometric access control. From scanning at multiple locations to understanding the sophisticated technology behind it, we've got you covered. 🌐🔍

Real-Time Help Desk - ServiceNow ITAM/ITSM - Tanium Tech Talks #84

See how Tanium can power the ServiceNow service desk experience with real-time visibility and control on today's Tanium Tech Talk. Without leaving the ServiceNow console, help desk agents can retrieve Tanium endpoint data and then take action immediately to close tickets faster. VIDEOS IN THIS SERIES CHAPTERS.

Trilio VMware Migration To Red Hat OpenStack Platform

Welcome to this short video on using a new feature of Trilio for OpenStack to migrate VMware VMs to OpenStack. In this video, I will demonstrate how we will migrate a couple of CentOS VMs to my Red Hat OpenStack Platform cluster. Trilio for OpenStack integrates into the Horizon experience, and from here we can launch the VMware Migration plugin to create a Migration Plan.

ITAM & CMDB - ServiceNow Integration - Tanium Tech Talks #85

See how Tanium can feed your ServiceNow CMDB with fresh asset inventory on today's Tanium Tech Talk. We're going to start at the beginning with asset data: hardware, software, usage, and more. Many Tanium customers update their ServiceNow CMDB multiple times per day to enjoy the benefits of accurate and timely asset data. SERVICE GRAPH CONNECTOR IS THE PREFERRED METHOD. VIDEOS IN THIS SERIES.

This Month in Datadog: DASH 2024 preview, Datadog Security for Google Cloud, and more

Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. To learn more about Datadog and start a free 14-day trial, visit Cloud Monitoring as a Service | Datadog. This month, our Spotlight is a preview of our annual conference, DASH 2024.

Ransomware Reality Check: Investing in Cybersecurity Pays Off | Razorthorn Security

Dive into the intriguing world of cybersecurity and ransomware recovery in this thought-provoking video. As news broke about a $100 million ransomware operation being halted, initial reactions ranged from skepticism to amusement. However, the swift return of these cybercriminals highlights the resilience and adaptability of such groups.

The Future of Robotics in Security: Opportunities & Risks

In today's rapidly evolving tech landscape, the integration of robotics into security systems presents both incredible opportunities and significant challenges. At Brivo, we're at the forefront of harnessing the power of smart spaces technology to enhance security automation and elevate the experience for employees and tenants alike. 🤖💼

Rethinking Law Enforcement Tactics in Cybersecurity Breaches | Razorthorn Security

Delve into the intricate world of cybersecurity breaches and law enforcement tactics in this insightful video. Uncover the root cause of breaches, such as the PHP vulnerability, shedding light on the pervasive challenge of patch management across industries. Critically analyze law enforcement's approach to handling cyber threats, as the decision to gamify the response raises questions about effectiveness and strategy. Should threat intelligence be wielded differently? Is there a missed opportunity in monitoring and gathering intelligence over time rather than immediate action?