Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

CrowdStrike Cloud Infrastructure Entitlement Management (CIEM)

Identity theft and overly permissive accounts are major challenges faced by organizations in public and hybrid cloud environments. Learn how CrowdStrike Cloud Identity and Entitlement Management (CIEM) can increase the security of your cloud infrastructure while simplifying management across clouds.

Payette Fends off Cyber Breach with Rubrik Security Cloud

Payette, the award-winning architecture firm behind iconic buildings of Harvard University, Boston Children's Hospital, MIT, and more, successfully fended off a potentially crippling ransomware attack. With Rubrik Security Cloud, the hacker never even had the opportunity to deliver a ransom note and the firm had critical systems back online in less than 24 hours.

Extend endpoint visibility with Google Chrome and Splunk security

Ever wondered how to find bad actors using only browser data? Attend this session to get a deeper understanding of the integration between Google Chrome and Splunk. See how to ingest data, and use it for threat hunting and adversarial identification. Speaker: James Young - Staff Security Strategist.

CrowdStrike Cloud Infrastructure Entitlement Management (CIEM)

Identity theft and overly permissive accounts are major challenges faced by organizations in public and hybrid cloud environments. Learn how CrowdStrike Cloud Infrastructure Entitlement Management (CIEM) can increase the security of your cloud infrastructure while simplifying management across clouds.

Dash Panel Discussion: Foundations of Security and Leadership at Scale

As businesses have modernized and migrated their tech stacks from on-prem to the cloud and broken down monoliths into microservices, security teams have had to evolve. This evolution has led to new tools and new practices to avoid incidents. In this panel moderated by Datadog’s Andrew Krug, we chat with security engineering leaders about the processes they’ve adopted or created to keep modern, distributed systems safe. We also discuss what organizations can do to keep ahead of threats as our systems keep advancing.