Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Indusface WAS URL Verification - Metatag Method

Verifying ownership is crucial when adding a new website to Indusface WAS. Before conducting a vulnerability scan on your website or app, confirming ownership of the application or domain is essential to prevent unauthorized access. For URL Verification on Indusface WAS, you can use any of the below methods: Learn how to verify your URL ownership using the Meta Tag method. This method provides a secure and efficient way to gain authorization before initiating scanning activities.

Indusface WAS URL Verification - Email Method

URL verification on Indusface WAS via email verification link: Verifying ownership is crucial when adding a new website to Indusface WAS. You would not be allowed to scan a website without the appropriate authorization from the owner. In order to perform a URL Verification on Indusface WAS, you may use this simple email verification method and start scanning your website right away.

The Howler Bonus Episode - Mental Health & Wellbeing Roundtable

In this bonus episode, pack members from around the globe have a conversation about what it looks like for them personally to prioritize mental health and wellbeing. Interested in running with the pack? Explore careers at Arctic Wolf—one of the fastest-growing and exciting cybersecurity companies in the world, to learn about how you can join our Pack, create impact, and influence what’s next in security operations.

Check if your secrets have leaked on GitHub - Has My Secret Leaked Demo

Since 2017 GitGuardian has been monitoring all public activity on GitHub. Now in a new product called Has My Secret Leaked you can check if your secrets on GitHub. In this video, Mackenzie runs through how to use both the web interface and CLI tool GGShield to check if your secrets have ever been exposed on GitHub, regardless of if they have since been deleted. Has My Secret Leaked is a service that will first create a secure hash of your secret locally then match it to other hashes in the GitGuardian database.

Hardening Graylog Encryptify Your Log Supply

Graylog Support Engineer Will Trelawny shares invaluable insights into enhancing Graylog security through encryption and authentication using transport layer security (TLS). He provides an in-depth and easy-to-follow walkthrough on setting up Graylog deployment configurations, encrypting communications, authenticating nodes, and securing the OpenSearch backend. The video also includes practical demonstrations on why and how to encrypt logs, authenticate log sources, and secure communication with OpenSearch. This video is an excellent resource for anyone looking to strengthen their Graylog security measures.

Strengthen Your Identity Security: CyberArk's Integration with AWS

In today's digital landscape, safeguarding identities is paramount. CyberArk's integration with diverse AWS technologies fortifies your defense against identity-focused threats. This collaboration empowers organizations to bolster their Identity Security strategies, thwart attacks, and ensure seamless, secure user experiences throughout the enterprise. Discover how CyberArk and AWS combine forces to elevate your security measures and protect against evolving cyber risks. Dive into this insightful video to learn more about this powerful partnership and safeguard your digital identities effectively.

Arctic Wolf Always Ahead: 2024 Cybersecurity Predictions

In this episode of Always Ahead, our Chief Product Officer Dan Schiappa explains why the cybersecurity industry should expect ransomware to continue to dominate the threat landscape in 2024, and why organizations that prioritize cyber insurance and AI integration are on the right track to protect their IT environment.