Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Rubrik and GraphQL - Episode 2 - GraphQL Queries

At the core of GraphQL lies the query. Queries allow us to fetch exactly the data we need from the Rubrik platform. This episode will dive into how we form basic queries to retrieve Rubrik objects for usage with automation. We’ll talk about how to form a query, create fragments, and pass data into our queries using variables.

1Password Developer Fireside Chat: Demystifying Atomics

Join 1Password senior developer, Nathan West, as he demystifies atomics – the primitive rules for safely interacting with shared memory from multiple threads. Nathan shows that, while complex, atomic code really is possible to understand. He discusses the C11 memory model, atomic and nonatomic operations, and memory orderings. Nathan also provides insight and clarification on the often-confusing concept of each thread having an independent view of the memory.

Improve Your Cloud Data Protection Through Protegrity's S3 AWS Marketplace Integrations

Protecting your data as it moves through data pools and warehouses is critical. Protegrity’s partnership and integrations with AWS allows corporations to improve continuous data flows with Protegrity Cloud Protect for S3.

Why You Need to Ditch Passwords, Private Keys, and All Other Forms of Secrets

Despite the steady drumbeat of news stories on security breaches caused by compromised credentials, 70% of teams still use secrets such as private keys or passwords to grant infrastructure access. In this webinar, we’ll cover why all forms of secrets are bad for you and your business, and why MFA is not good enough. We'll cover how the adoption of Passwordless Authentication and related hardware technologies like TPMs and HSMs fix a slew of problems, including making phishing attacks a thing of the past.

NC Protect advanced data protection for secure government, defense & supply chain collaboration

Empower your agency to take advantage of all the productivity and collaboration capabilities the Microsoft 365, Teams and SharePoint Server have to offer with zero trust ABAC powered information security from NC Protect.

CISOs Need to Speak the Language of Board Members

"I understand the pitfalls of cyber security, but my boss just won't support me with the budget I need.” Does this sound familiar to you as a CISO? I have 3 pieces of advice for you: Speak their language I like to say that CISOs are from Mars, while CEOs and board members are from Venus. It’s because they don't speak the same language. You might go to your board and say, “I installed Akamai Prolexic.1.4.4.3.1./24 subnet to mitigate an SYN flood attack.”