Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Beyond EDR: Securing Your SaaS Attack Surface with LimaCharlie Adapters

The modern attack surface has shifted beyond endpoints to SaaS applications and cloud identities. Traditional security tools focused solely on endpoint telemetry miss sophisticated attacks that never touch the endpoint. Join Ken Westin to explore how LimaCharlie's adapters provide comprehensive visibility across your SaaS environment. We'll demonstrate collecting and analyzing telemetry from business-critical applications like 1Password and GitHub, plus newly supported platforms like HubSpot.

[Promo Video] Managed Cyber Risk Services

Protect Your Business with Managed Cyber Risk Services | SecurityScorecard Cyber threats are evolving, and your business needs proactive defense. SecurityScorecard's Managed Cyber Risk Services help organizations identify, monitor, and respond to cyber threats across their entire digital ecosystem.

Fed Gov Today: Breaking Security Barriers to Government Modernization

Jim Coyle, U.S. Public Sector CTO at Lookout, discusses the challenges government agencies face in embracing mobility, cloud security, and AI. While modernization efforts are progressing, many organizations still struggle with security concerns, particularly around mobile devices, which are increasingly targeted by cyber threats. Coyle highlights the need for stronger public-private partnerships to accelerate secure digital transformation. He also shares the importance of understanding data sovereignty in AI and improving endpoint security to protect classified and unclassified information.

Security Week teaser and Lisbon's waves of entropy

We’re back with new episodes in 2025, kicking off this week with a Security Week teaser. Host João Tomé is joined by Michael Tremante, Sr. Director of Product Management, to discuss what to expect from our first innovation week of the year, starting next week. They also explore the security landscape in 2025 and the importance of simplicity.

Eliminate Security Complexity on Pi Day | WatchGuard Technologies

Cyber threats don’t stop, just like Pi (π). That doesn’t mean your security should be stuck in an endless loop of updates, patching, and stress. WatchGuard delivers real security - tailored to you, eliminating complexity, and keeping you ahead of threats. This Pi Day (3.14), let’s celebrate security that works.

Intro to Cisco Secure Application in Splunk AppDynamics

Welcome to this in-depth introduction to Cisco Secure Application in Splunk AppDynamics. In this video, I’ll walk you through how Cisco Secure Application seamlessly integrates with your existing Splunk AppDynamics APM agents to provide real-time security monitoring. We’ll first review the high-level architecture of Cisco Secure Application, and then I’ll show you how to use the Cisco Secure Application dashboard to monitor the security status of applications, business transactions, libraries, vulnerabilities, attacks, and observations.