Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Cryptographic failures | OWASP TOP 10

In this video, we'll delve into the world of cryptography and explore the ever-evolving landscape of cryptographic failures. We'll start by examining the shift in the OWASP Top 10 from "Sensitive Data Exposure" (A03:2017) to "Cryptographic Failures" (A02:2021), highlighting the growing importance of proper cryptographic implementation in securing sensitive data.

Always Ahead: Arctic Wolf on Artificial Intelligence

In this episode of Always Ahead, our Chief Product Officer Dan Schiappa explains how Arctic Wolf is incorporating the efficiency and speed of artificial intelligence into our security journey, empowering our world-class security concierge team to deliver comprehensive protection at the speed of data.

Decoding Cybersecurity: Pipelines vs. Power Grid | Unveiling the Unique Challenges in Legislation

Dive into the fascinating realm of cybersecurity with our latest exploration, as we dissect the historical focus on electricity grids versus the unique challenges posed by pipelines. Traditionally, issues on the electricity grid have captured immediate attention, often portrayed in Hollywood hacking scenes with dramatic attempts to switch off lights. However, the landscape shifts when it comes to pipelines.

Falcon Exposure Management Asset Criticality Rules: Demo Drill Down

Undifferentiated protection of assets can lead to misallocated resources and vulnerable critical systems. Falcon Exposure Management's Asset Criticality Rules feature allows for precise prioritization of your most essential assets, ensuring they receive the focused protection they deserve. This demo will showcase how effectively implemented criticality rules bring clarity and strategic security to safeguard your key assets where it matters most.

Securing Your Cloud Infrastructure with Azure & Tines

In the third instalment of "Tines, securing your cloud infrastructure" we look at two stories designed to save money and resources and close potential security gaps in your Azure environment. Firstly, we'll address the task of 'Updating groups assigned to a user in Azure Active Directory' which allows admins to update a user's group membership in Azure Active Directory. This is essential for adding extra security to accounts flagged for suspicious activity and protecting the team & company as a whole.