Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Securing Enterprise Data: Data Loss Prevention for Large Language Models (LLMs) like ChatGPT, Bard

We're thrilled to introduce our cutting-edge Data Loss Prevention (DLP) tool designed specifically to protect enterprise data when using Large Language Models (LLMs) like ChatGPT, Bard. Data security in corporate settings is more critical than ever, and with the rise of LLMs, new challenges emerge. Join us as we unveil our innovative DLP solution tailored to the unique demands of LLM-powered applications. Explore how our tool can identify and mitigate data breaches, ensuring your company's sensitive information remains confidential.

Lookout Cloud Security Platform: Free Your Hybrid Workforce

A way to protect your hybrid workforce *and* your corporate data on any app, device, or endpoints? With the Lookout Cloud Security Platform, you can offer your employees the freedom to collaborate, at any place, any time, from any device with total peace of mind. And that’s because the Lookout Cloud Security Platform allows you to detect, mitigate, and respond to real-time threats without locking down apps and devices.

R4IoT: When Ransomware Meets IoT and OT | Forescout Research

Forescout Research - Vedere Labs has released a demonstration, report and detailed playbook describing how organizations can protect themselves against R4IoT: a novel, proof-of-concept ransomware that exploits an IoT device to gain access and move laterally in an IT network and impact the OT network. This demonstration is backed by rigorous research into IT, OT and IoT asset vulnerabilities as well as current ransomware trends.

Q2 2023 Threat Landscape Report: All Roads Lead to Supply Chain Infiltrations | Webinar Replay

Watch Kroll’s cyber threat intelligence leaders highlight key trends observed in Q2 2023 and outline the critical issues that organizations should be aware of, including a significant rise in ransomware activity fueled by the MOVEit vulnerability and new methods of email compromise attacks.