Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Remote Browser Isolation (RBI) with Cato Networks [Demo]

Learn how quick and easy it is to secure your internet traffic using Remote Browser Isolation by Cato Networks! Cato’s Remote Browser Isolation (RBI) service provides secure browsing through a virtualization service that streams web pages safely to the user’s device. In-browser code is executed remotely, keeping users safe from threats such as ransomware and phishing. Cato RBI is also simple to set up. It is accessible in minutes with just a few clicks, unlike some competitors who require complex setup. Cato RBI requires no maintenance: there is nothing to install and nothing to patch.

IT Budgeting in Economic Downturns

Dive into the world of IT budgeting with our illuminating video! Explore how different businesses allocate resources based on revenue and spending percentages. Whether you're a tech-focused giant investing up to 20% for cutting-edge solutions or a manufacturing entity assigning 5-10% for essential IT needs, gain insights into financial strategies that drive tech investments. Uncover real-world examples, from fintech firms with comprehensive tech budgets to manufacturing companies prioritizing cybersecurity and infrastructure. Simplify IT budgeting complexities, make informed decisions, and navigate evolving tech landscapes.

How we found a prototype pollution in protobufjs - CVE-2023-36665

In this webinar excerpt, our colleague Peter Samarin demonstrates how our prototype pollution bug detectors were able to uncover a highly severe CVE in the popular JavaScript library protobufjs. This finding puts affected applications at risk of remote code execution and denial of service attacks.

The NIST CSF 2.0: Framework Governance?

In this week's episode, Bill and Robin discuss the brand-new cybersecurity framework from the National Institute of Standards and Technology. Dubbed the NIST CSF 2.0, this expands on their first iteration by adding a new pillar of 'Governance.' What is the CSF, how is 2.0 different from 1.0, and why should you care? Learn all this and more on the latest episode of The Ring of Defense!

Investment Amid Cheap Money

In this insightful video, we delve into the current financial landscape marked by an extended period of low-interest rates, booming exits, and the crucial need for returns on investments. With money becoming cheaper, the urgency to put it to work has never been greater. Whether you've recently made a substantial sum or have significant capital on hand, the dilemma remains the same: how to make your money grow in the face of looming inflation.

Consent Phishing Mystery

Janice was notified of an unauthorized $10,000 transfer from her account. Which of her co-workers is behind this nefarious attack? And how did they gain access to her personal data? Find out in this silent mystery. Learn more about Security Awareness and how it can prepare your employees to recognize and neutralize social engineering attacks and human error.

Customize Your Automated Incident Severity Scoring Rules In GitGuardian

GitGuardian has always made it easy to triage secret leak incidents, Now with custom severity rules, you can automate how GitGuardian labels the criticality of each incident. Fine-tune the pre-built scoring definitions and add your own custom rules that help your team with your particular requirements.

Play Your Cards Right: How to Adapt Your GRC Program to the Modern Tech Stack

With the drastic evolution of the modern tech stack over the last few years, cloud-based services and tools now power everything from fundamental infrastructure to communication to cybersecurity. GRC programs have had to keep pace and many are still playing catch up—what a gamble. 🎲 What You'll Learn We're laying all our cards on the table, exposing the risks that come with leveraging the cloud services in a modern tech stack to power your operations and showing you how to stack the odds in your favor.

Improve the Use of Your Data with End-to-End Data Protection Solutions | Protegrity Data Protection

Welcome to the new age of data usage. Start utilizing your data to its full potential while maintaining compliance and end-to-end protection. More from Protegrity: For over 15 years, Protegrity has set the standard in precision data protection, helping enterprises secure and use a perpetually growing store of sensitive data. Through granular protection and intelligent role-based empowerment, Protegrity helps companies focus on growth, development, and optimization.