Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Teleport Cloud Enablement Series 101 - Joining Resources and Access Deep Dive

Welcome to the Teleport Cloud Enablement Series 101! The enablement series contains four unique sessions for new Enterprise Teleport Cloud users to attend depending on your interests and the current state of your Teleport rollout. Each series follows a logical progression of establishing the Teleport Cloud tenant, connecting resources, deploying advanced features, monitoring, and ensuring users succeed when migrated.

GDPR Compliance Audit - Evaluating Your Data Protection Practices

The GDPR is a regulation established by the European Union to provide guidelines for the collection and processing of personal data within the EU. A GDPR compliance audit is an independent and systematic evaluation of an organization’s adherence to these guidelines. The goal of such an audit is to help organizations meet their obligations under the GDPR and identify areas for improvement.

Teleport Cloud Enablement Series 101 - Advanced Integrations and Security Features

Welcome to the Teleport Cloud Enablement Series 101! The enablement series contains four unique sessions for new Enterprise Teleport Cloud users to attend depending on your interests and the current state of your Teleport rollout. Each series follows a logical progression of establishing the Teleport Cloud tenant, connecting resources, deploying advanced features, monitoring, and ensuring users succeed when migrated.

Starting Strategies: Where to Begin After Purchasing Snyk

Luke Sanders, Senior Technical Success Manager, shares quick tips and best practices for getting started with Snyk. Topics covered include: Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.

Balancing Act: Navigating Cybersecurity Impacts on User Experience

In the world of cybersecurity, every implementation comes with its own set of effects. Join us as we delve into the crucial considerations of security measures and their potential consequences. From understanding who might be impacted to addressing minor drawbacks like increased effort for tasks such as setting up two-factor authentication, we explore the delicate balance between robust security and user acceptance. Learn from real-world examples how achieving harmony between cutting-edge security practices and user comfort can lead to better outcomes for all. Don't miss this insightful discussion on winning both hearts and minds in the realm of cybersecurity!

Teleport Cloud Enablement Series 101 - Getting Started with Teleport Cloud

Welcome to the Teleport Cloud Enablement Series 101! The enablement series contains four unique sessions for new Enterprise Teleport Cloud users to attend, depending on your interests and the current state of your Teleport rollout. Each series follows a logical progression of establishing the Teleport Cloud tenant, connecting resources, deploying advanced features, monitoring, and ensuring users succeed when migrated.

ISO 27001 Compliance for SaaS | SOC2 vs ISO | Girish Redekar (CEO & Co-Founder, Sprinto)

Overview: In this podcast, Girish Redekar (CEO and Co-Founder, Sprinto), shares with Venky the most effective ways to implement the ISO 27001 framework for organizations to attain comprehensive security, rather than solely obtaining a certification. He also discusses similarities & differences between SOC2 and ISO 27001, and suggests that organizations can streamline their security program to achieve multiple certifications more efficiently.

Teleport Cloud Enablement Series - User Migration, Logging, Troubleshooting, and Upcoming Features

Welcome to the Teleport Cloud Enablement Series 101! The enablement series contains four unique sessions for new Enterprise Teleport Cloud users to attend depending on your interests and the current state of your Teleport rollout. Each series follows a logical progression of establishing the Teleport Cloud tenant, connecting resources, deploying advanced features, monitoring, and ensuring users succeed when migrated.