Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Introducing GitGuardian Software Composition Analysis (SCA)

Introducing GitGuardian Software Composition Analysis, further expanding the capabilities of our code security platform. You have long known GitGuardian for secrets detection and remediation, honeytokens, and IaC scanning. Now, with GitGuardian SCA, you can effortlessly scan your applications to detect known vulnerabilities introduced through both Direct & Transitive dependencies. The platform will automatically prioritize incidents depending on their context and help developers find the best path to remediating any issues.

A CISO's Checklist For Securing APIs And Applications

Building a robust API and application security program is a key objective for security leaders in any market. But developing and maintaining an effective security program for your APIs and web applications requires: ‍- A deep understanding of the right approach to implementing API and application security.

A CISO's View on the State of API Security: Discussing the API ThreatStats Report, Q2 2024

API exploits represent one of the fastest growing threat vectors–a trend that will continue to accelerate as the increasingly AI-driven digital economy grows. Join veteran CISO and application security expert Mike Wilkes and Wallarm’s VP of Product, Tim Erlin, as they discuss the state of API security and where it is heading. Drawing upon their extensive industry experience as well as insights drawn from the Wallarm API ThreatStats Report Q2, 2024.

Cybersecurity Sessions S03E01: "Bot's the Story, Morning Glory?" Oasis Ticket Scalper Bots

Netacea bot experts discuss the challenges around the Oasis reunion tour ticket sales, focusing on the issues caused by bots and scalping in high-demand events. The discussion explores the technical difficulties of managing ticket sales, the tactics used by bot operators to secure tickets, and the broader implications for the industry. The team also discuss why current methods to prevent bot activity often fail and why a multi-pronged strategy combining real-time detection, post-transaction analysis, and clamping down on secondary markets is critical.

Minimizing the Impact of Cloud Attacks

What does your organization have in place to minimize the damage when an incident happens? Having handled thousands of incident response cases, our experts recommend putting high quality monitoring tools in place to detect potential threats to the cloud, such as zero-day vulnerabilities, misconfigurations and insider threats and more. Watch now. Additional Kroll Research on Cloud Safety.

How to add a Google Workspace organization as a Datasource for Backup

In this BDRSuite demo, I'll guide you through adding Google Workspace Organization as a Data Source in BDRSuite Backup Server BDRSuite provides a complete backup solution for your Google Workspace data, covering user mailboxes, Google Drive, calendars, contacts, and shared drives. It also features flexible storage options, data export in formats like PST, and much more.

TCPRS Tanium Certified Professional Endpoint Risk and Security - Certification - Tech Talks #103

Welcome to this segment of the Tanium certification series. Today's exam covers some of the most popular use cases and modules of Tanium in the risk, security, and compliance areas. We're talking about the brand new TCPRS exam, Tanium Certified Professional - Endpoint Risk & Security. As with other exams in this series, I've invited one of the specialists who helped author the exam questions to give us an inside look at what is covered and to help us prepare for this exam.