Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

How to add a Google Workspace organization as a Datasource for Backup

In this BDRSuite demo, I'll guide you through adding Google Workspace Organization as a Data Source in BDRSuite Backup Server BDRSuite provides a complete backup solution for your Google Workspace data, covering user mailboxes, Google Drive, calendars, contacts, and shared drives. It also features flexible storage options, data export in formats like PST, and much more.

Install ggshield On macOS Using Signed .pkg Files

MacOS users can now opt to install ggshield using our new signed packages. Installing ggshield, the GitGuardian CLI is a very quick process, but traditionally has required use of python's pip or homebrew on a macOS system. With the release of ggshield 1.27.0 we are now proud to offer signed DOT P G K files, making it possible to easily distribute ggshield to your team and leverage the official Mac Installer. Since it is officially signed, once downloaded, it just takes a couple of clicks to get it installed.

TCSCD Tanium Certified Specialist Cloud Deployment - Certification Series - Tanium Tech Talks #101

Welcome to this installment of the Tanium certification series. Today's exam covers key knowledge for planning and deploying Tanium in the cloud. We're talking about the TCSCD exam, Tanium Certified Specialist Cloud Deployment. As with other exams in this series, I've invited one of the experts who helped write the exam questions to give us an insider's look at what is covered and to help you prepare.

DORA & NIS2: The Cybersecurity Regulation Revolution

Are you ready for DORA and NIS2? Discover how these regulations could transform your security strategy! Welcome back to another episode of Razorwire! Today we unpack the DORA and NIS2 regulations with esteemed cybersecurity expert Richard Cassidy. I’m your host, Jim Rees, and I’ll be guiding the conversation for anyone navigating the evolving landscape of digital security in the financial sector. In this information-packed episode.

One AppSec Platform. One Price.

������ ������������ ����������������.������ ����������. Application security is necessary – our platform makes it effortless Mend.io's proactive platform finds and fixes vulnerabilities before they hit your codebase with a new unified AppSec platform.

Shifting From Reactivity to Proactivity in AppSec with Phil Guimond - Secrets of AppSec Champions

"In Episode 03 of the SAC | Secrets of AppSec Champions podcast titled ""Compromised: Proactive to Reactive,"" hosts Chris Lindsey and guest Phil Guimond tackle the critical distinctions between proactive and reactive security strategies. They emphasize the importance of access logging and visibility in detecting compromises early, pointing out how changes in access logs can signal potential threats. They stress the necessity of implementing secure, tamper-proof log storage and discuss automation solutions like the ""Have I Been Pwned"" API and CAPTCHA to mitigate risks such as account takeovers.

Detect Secrets In Microsoft Teams With GitGuardian

GitGuardian can now help you find and remediate secrets exposed in your Microsoft Teams channels. We have extended the real-time detection capability of our secrets detection platform to include the popular communications tooling to help teams better fight secrets sprawl throughout their organizations Once integrated, whenever a plaintext credential is accidentally posted to Teams messages, GitGuardian will create an alert and the incident will appear in your GitGuardian dashboard, allowing you to remediate it like any other leaked secret.

Random but Memorable - Episode 13.4: Creating Cybersecurity Program Pie with Alan Watkins

Why should we stop using work laptops for personal use? Is your car sneakily selling your driving data? We answer all that and more in Watchtower Weekly. We also invite special guest, Alan Watkins, to the show to walk through his book: Creating a Small Business Cybersecurity Program. Tune in, as Alan serves up a non-technical guide for small business owners to get started with security and putting privacy at the heart of their business.