Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Navigating Deep Fakes and Geopolitical Risks in 2024: The AI Defensive Edge || Razorthorn Security

Dive into the complex world of deep fakes and the looming geopolitical risks of the upcoming year in my latest video. From the potential misinformation campaigns during elections to the role of AI, I explore how these elements intertwine and impact our digital landscape. AI is not just a potential threat; it can also be a formidable defense. I discuss the emergence of AI-driven products designed to counteract misinformation and the evolving landscape of AI battling AI. Are we stepping into a future reminiscent of sci-fi, where machines combat each other, leaving humans out of the crossfire?

Network Analytics Logs: Using Splunk to view network traffic and DDoS attacks

Cloudflare Magic Transit is a network security solution that offers DDoS protection, traffic acceleration, and much more from every Cloudflare data center— for on-premise, cloud-hosted, and hybrid networks. In this video, we show how to integrate Cloudflare Network Analytics logs to view network traffic and DDoS attacks in your Splunk dashboard.

Keeper Webinar With ActualTech Media - Identity & Access Management

Keeper was invited by ActualTech Media to discuss Identity & Access Management: Keys to Success in 2024 EcoCast. Tom Cole, a solutions engineer at Keeper, dives into what makes KeeperPAM a next-gen privileged access management solution that delivers enterprise-grade password, secrets and privileged connection management in one unified platform.

Securing Database Access: DPA Vaulted Account Approach with Native HeidiSQL Utility

In this video, we'll guide you through the process of utilising CyberArk DPA's capabilities to seamlessly connect to a Postgres database using the HeidiSQL client, leveraging the secure foundation of Vaulted Accounts for enhanced security and efficiency.

What Is a Password Manager?

A password manager is a tool that allows you to store and manage your personal information, such as login credentials, credit card numbers, passport and more, in an encrypted digital vault. Some password managers allow you to store passkeys too. With a password manager, the only password you have to remember is your master password, which acts as the key to enter your secure vault.

Automated SCM project scanning with Black Duck SCA | Synopsys

Black Duck’s automated project onboarding meets teams where they already are and enables them to quickly onboard and scan multiple projects in a single step. This means no manual scanning needed, and no interfacing with builds or pipeline – these scans are mapped and executed entirely within Black Duck. In this video, we'll demonstrate how to.

DevSecOps Security Best Practices

Carmine Acanfora, Solutions Architect at JFrog in the EMEA region, leads this security best practices webinar. In this webinar, we discuss the advanced features of the JFrog Advanced Security solution, now available in self-hosted mode. We will take the time to address your questions, particularly on topics crucial for all developers, such as: Don't miss this opportunity to explore JFrog's latest security solution and learn how to accelerate and secure your software supply chain with the first DevOps-oriented security solution on the market.