Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Cyber Incident Response (CIR) Readiness Assessment

Discover the essential shield for your business in the face of cybersecurity threats with our Cyber Incident Response Readiness Assessment. Uncover vulnerabilities, enhance your incident response capabilities, and ensure swift, effective responses to cyber incidents. Choose us for a comprehensive readiness assessment and fortify your organisation's security against evolving threats. Your protection is our priority. Contact us now to safeguard your business.

Ransomware readiness assessment services

Discover the key to safeguarding your business from ransomware attacks with our Ransomware Readiness Assessment services. In this video, we delve into the importance of assessing your readiness, uncover common issues, and outline our robust methodology to conduct a comprehensive assessment. Service quality underpins everything we do.

Shielding the Foundation: Security Across Your SSC

Developers are now the target of the attacker, with binaries available publicly. While it's unlikely that the concept of security point solutions will completely disappear, it’s clear that the market is demanding a consolidated, comprehensive approach to pipeline security across the attack surface. With the increasing complexity of software supply chains, security and governance are becoming critical on developer’s machines, at the C-level and in boardrooms. In this session, Eyal Dyment, VP of Security Product for JFrog, details how next-gen software supply chain solutions must incorporate robust, holistic security or risk being the next tool to be consolidated.

Microsoft's AI Experiment Gone Wrong: The Rise and Fall of 'Emily' - From Innovation to Controversy

In this eye-opening video, we delve into the intriguing story of Microsoft's AI experiment, affectionately known as 'Emily,' and its transformation from an innovative creation to a controversial internet sensation. Just a few years ago, Microsoft introduced 'Emily' to the world, a cutting-edge AI designed to interact with and learn from internet users. However, the results were far from what anyone expected.

Release Fast and Secure or Die!

Repetitive tasks are the antithesis of speed. The only way to deliver software rapidly, securely and with quality is to automate software packages across the software supply chain to drive enhanced testing, improve decision-making, eliminate bottlenecks and holistically manage your software resources. Join Yossi Shaul, SVP of R&D, JFrog, and Gali Zisman, VP of Product, JFrog, to explore JFrog’s new release-first approach, including exclusive swampUP announcements, first-time demonstrations & key product advancements!

What is NQE?

Using Network Query Engine, Forward Enterprise users can start querying their network without knowing which vendors are present and search for what they want to report on without worrying about the different ways to capture and parse this information in a multi-vendor environment. This gives the network and security operators access to normalized and structured data that is easy to consume and generate reports on to answer questions that were next to impossible to answer without access to this structured data.