Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Virtual Endpoints (VDI & VMs) - Tanium Agent FAQs - Tanium Tech Talks #90

How do I tune Tanium for virtual infrastructure like VMs and VDI? Many folks who have worked in IT ops are familiar with the struggle of keeping virtual infrastructure properly resourced with memory, disk, CPU, and network. Sometimes it’s a balancing act of hardware, budget, and virtual machines. Now you’re deploying a real time agent on every guest on those virtual hosts, so how can we make sure it doesn’t create a resource storm?

Unrealistic Cybersecurity Job Expectations: The Talent Gap Issue | Razorthorn Security

Amy Stokes-Waters critiques the unrealistic expectations in cybersecurity job descriptions, highlighting a significant industry challenge. Discover why demanding expertise in both SOC operations and pen testing for a single role, with insufficient compensation, exacerbates the talent gap. This clip exposes the harsh realities of the cybersecurity job market and the need for more realistic hiring practices to attract and retain skilled professionals.

Agent Impact on Endpoints - Tanium Agent FAQs - Tanium Tech Talks #88

Often we get the question, “What is the impact of the Tanium agent on the endpoint?” Today we’re going to unpack that answer as part of a series on optimizing the Tanium agent for your environment. In this series we’re going to explore expectations for endpoint agent load, look at agent tuning, talk about proper anti-virus exclusions, what to consider for virtual infrastructure, and more. Today we’re going to focus on the baseline load of the Tanium agent on your endpoints: disk, memory, CPU, network.

AI Awareness Gap: Bridging the Disconnect Between Tech Experts and the Public | Razorthorn Security

Amy Stokes-Waters sheds light on the disconnect between technology enthusiasts and the general public's interest in tech, specifically AI advancements. In this engaging clip, Amy discusses the challenge of communicating complex tech concepts, like AI-generated content, to those outside the IT sphere. She emphasizes the need for better education on technologies that are reshaping our media landscape. Dive into this discussion to understand why simplifying tech talk is essential for broader awareness and acceptance.

Secure Your IoT: Mastering Conscious Interaction with John Szczygiel

Dive deep into the world of IoT security with John Szczygiel as we explore the critical importance of conscious interaction between hosts and panels. In today's digital age, ensuring the safety of your IoT devices is not just a necessity; it's a responsibility. Join us at Brivo as we uncover the secrets to maintaining robust security protocols and learn how to protect your smart spaces from potential threats. Don't miss out on this insightful journey into the heart of IoT security. Remember, knowledge is power, especially when it comes to safeguarding your digital world. 🚀🔒

The Evolving Perception of Cybersecurity: A Funding Gap Analysis | Razorthorn Security

Join Amy Stokes-Waters as she discusses the significant shifts in how cybersecurity is perceived over the last five years, highlighting a persistent challenge in funding. Despite spending $450 billion on information security, the scale of criminal activity, valued at $9.5 trillion, suggests a dire need for increased investment. This clip explores the financial discrepancies and emphasizes why robust funding is crucial to effectively combat cyber threats.