Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

BDRSuite v7 1 0 Deep Dive Enhancing Your Data Protection & Recovery Plan

This is the exclusive webinar on BDRSuite v7.1.0 by Vembu! In this in-depth session, we explore the latest features and enhancements that make data protection simpler and more powerful for IT environments, including virtual machines, servers, cloud, and endpoints. Key highlights of BDRSuite v7.1.0 include: a) Agentless backup and recovery for Proxmox VE and oVirt b) Remote backup capabilities for VMware and Hyper-V virtual machines c) Simplified Bare-Metal Recovery processes d) Chat & Conversation Backup for Microsoft 365 Teams.

Detect and Prevent Insider Threats with Lookout

Discover how to safeguard your organization from one of the most significant threats: malicious insiders. Learn to differentiate between legitimate user behavior and nefarious activities. By leveraging user and entity behavior analytics (UEBA), real-time alerts, adaptive security policies and dynamic decryption, the Lookout Cloud Security Platform ensures comprehensive protection against insider threats.

Zero Trust Models Against Emerging Threats

Cybercriminals have become more sophisticated than ever and have access to many tools to carry out their attacks. It's important to understand that cybersecurity is not a one-and-done task, but rather an ongoing process that requires constant assessment and improvement. This is why the cybersecurity industry is evolving rapidly, embracing new protection methods that integrate AI-powered technologies and services to automatically detect threats and stay one step ahead of advanced attacks.

Tricentis Tosca Secrets Manager Integration with CyberArk Software

- In this video, we explore the integration between Tricentis Tosca and CyberArk, demonstrating how to securely store and manage sensitive data, such as passwords and multi-factor authentication (MFA) keys, directly in CyberArk. Learn how to seamlessly access this data in your test cases and configurations when needed. This integration ensures enhanced security for your test automation by centralizing sensitive data management within CyberArk. Be sure to subscribe for more tutorials on test automation and security best practices!

Navigating Access Challenges in Kubernetes-Based Infrastructure

Organizations often find that as they deploy their K8S infrastructure into production and across their company, what worked well for managing access during development does not scale efficiently. Research shows that this often leads to serious security risks including breaches. So, new access challenges emerge, particularly as teams scale. Join us for a 30-minute deep dive into how to secure access to Kubernetes-based environments including clusters, databases, and applications in a scalable way.

ChatGPT vs Cyber Threats: The REAL Role of AI in Cybersecurity

Unlock the truth about using Large Language Models (LLMs) in cybersecurity - are they the next big thing or just another trend? In this episode of Razorwire, your host, James Rees, brings together cybersecurity expert Richard Cassidy and data scientist Josh Neil to talk about the use of AI and large language models (LLMs) in cybersecurity and their role in threat detection and security. Join us for a discussion on the capabilities and limitations of these technologies, sparked by a controversial LinkedIn post.