Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Trustless Infrastructure: Securing Critical Assets with Teleport

The global pandemic and push for remote work are putting companies’ IT infrastructures at greater risk than before. This risk grows as infrastructure is scaled, and more people gain access to highly sensitive data, such as access keys to a valuable password vault. Another vulnerability is the use of passwords since they can also be compromised. To overcome these risks and protect critical infrastructure, the implementation of a zero-trust access solution is needed. But how can we accomplish that without slowing down engineers or adding administrative overhead?

AppSec Decoded: Application security orchestration and correlation | Synopsys

In this edition of AppSec Decoded, recorded at RSA 2022 in San Francisco, cybersecurity experts Anita D’Amico, vice president of business development with Synopsys, and Taylor Armerding, security advocate with Synopsys, discuss the specific functions and benefits of ASOC tools.

[PAM Masterclass] Episode 4: Simplifying privileged session management

In this episode of PAM masterclass, you will learn how to launch privileged sessions by configuring remote access pathways. You will also gain insights into how admins can monitor and record live sessions and suspend malicious user activities using ManageEngine's flagship PAM suite, PAM360.

#BigPictureCyber Town Hall With Malcolm Harkins, Epiphany Systems | 7/14/22 | NeoSystems

NeoSystems #BigPictureCyber Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly #BigPictureCyber Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, cybersecurity news, how to prepare for CMMC certification, and the latest updates from the CMMC AB.

Appknox Webinar: Introduction to Reverse Engineering

About The Webinar: The cybersecurity landscape is constantly evolving, making it a challenge to stay ahead of attackers. They are always looking to exploit & gain access to control sensitive information. This can lead to serious consequences, such as ransomware attacks. This means integrating security as a core part of the development process is becoming even more essential by the day.

Teleport Demo - 30 Minute Overview

0:00 Intro

1:00 Architecture Overview

3:00 Single Sign On Integration

5:00 Teleport Server Access

7:00 tsh and session recordings

9:00 Teleport App Access

11:00 RBAC Mapping

12:05 Teleport K8s Access

15:00 Teleport DB Access

18:00 Teleport RDP Access

22:00 Access Requests

24:00 Teleport Slackbot

26:00 Active Session Joining
27:00: Trusted Clusters

28:00 Open Source vs Enterprise