Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Datadog on AWS Identity Management

For many engineers, Identity Management can elicit a broad range of emotions—from confusion during setup and configuration, to complete disinterest as it disappears into the background during day-to-day work, to frustration they encounter erroneously blocked access, and sometimes to terror when misconfigurations lead to a breach.

Unraveling Conspiracies: Hacking, Allegiances, and Corporate Chess || Razorthorn Security

Dive deep into the realm of intrigue with our latest video, "Double Conspiracy Theories Unveiled!" Grab your tin foil hats because we're about to explore two mind-boggling mysteries that will leave you questioning everything. In Conspiracy #1, we venture into the shadows to unravel the mystery of a hacking incident. Who was behind it, and were they working for someone sinister? The plot thickens as we peel back the layers, and the truth seems to be shrouded in secrecy.