Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Challenges of Law Enforcement in the Digital Age Navigating the Limits of Disruption

Join us as we navigate the complex challenges faced by law enforcement in the digital age. Despite efforts to take down, disrupt, and pressure criminal elements, the reality remains that these actions may not be enough to halt their activities. In this candid discussion, we explore the limitations of law enforcement in combating digital crime, acknowledging the difficulties they face in reaching elusive perpetrators hiding across the globe. While not dismissing their efforts entirely, we recognize the inherent challenges they encounter when confronting organized crime in cyberspace.

Enterprise End User SSO Login

Learn how to create your Keeper Account on iOS in less than 2 minutes with our step-by-step guide. Your Keeper vault is easy to create, simple to use, and you’ll be up and running in just minutes. You can create and access your Keeper vault by either logging in directly from Keeper via an email invitation from your Keeper Administrator or from your SSO provider dashboard.

Reshaping private equity with Hiive

Today I’m speaking with Sarah Huggins, the co-founder of Hiive—a groundbreaking online marketplace that is reshaping the trading of private securities. With a rich background as a seasoned lawyer and entrepreneur, Sarah brings a unique blend of legal acumen and strategic innovation to the financial technology sector. Sarah is a strategist at heart, dedicated to solving complex problems and nurturing high-caliber teams. Let's dive into her insights and experiences.

Reddit's Matt Johansen on renouncing superhero culture and what comes after "shift left"

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Matt Johansen. Matt is a security veteran who has helped defend startups, the biggest financial companies in the world, and everything in between. Alongside his day job as Head of Software Security at Reddit, he teaches companies how to protect against cyber attacks, and coaches entrepreneurs and CISOs that need help with infrastructure, application, cloud, and security policies. He also writes Vulnerable U, a weekly newsletter that talks about embracing the power of vulnerability for growth.

ManageEngine PAM360: An overview

PAM360 is a comprehensive solution for businesses looking to incorporate PAM into their overall security operations. With PAM360's contextual integration capabilities, you can build a central console where different parts of your IT management system interconnect for deeper correlation of privileged access data and overall network data, facilitating meaningful inferences and quicker remedies. In this video, our product expert will give you an overview of PAM360 software.

SIEM in Seconds - Splunk Enterprise Security Auto Refresh and Timeline of Notable Events

SOC analysts are overwhelmed sifting through a sea of notable events. They are unable to prioritize events and act fast. With Auto Refresh in the Incident Review interface, users will not have to re-run the Incident Response search or refresh the page. Furthermore, an interactive timeline for notable events within the Incident Response interface enables the SOC to quickly prioritize critical incidents.

SIEM in Seconds - Streamline Investigations with Splunk Enterprise Security

A SOC analyst's day-to-day tasks involve investigating notable events to gather information about security incidents. Recent enhancements within the Incident Review and Risk Analysis dashboards in Splunk Enterprise Security allows analysts to streamline their investigation process and reduce the number of manual tasks they perform daily. Multiple drill-down searches on correlation rules, updates to "dispositions" in the Incident Review dashboard, and hyperlinks in Correlation Search “Next Steps” allow for faster, more efficient investigations.

Unraveling Global Financial Scandals: Insights into State-Sponsored Operations

Dive into the murky world of global financial scandals and state-sponsored operations with us. From the Wirecard scandal to the 1MDB debacle, and the infamous case of Edward Snowden, we uncover the intricate web of espionage and corruption that spans nations. Join the discussion as we explore the role of nation-states in these high-profile cases, where operatives are allegedly turned by foreign intelligence agencies to carry out nefarious deeds. From missing COOs to operatives fleeing to foreign countries, the plot thickens as we delve deeper into the shadows of international intrigue.