Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

A Partnership Protecting Critical Infrastructure: Centripetal and Dynics

Threat activity today is incredibly high, and industrial infrastructure is a primary target. Centripetal and Dynics are partnering to combine IT and OT expertise to better protect critical infrastructure and industrial control systems across the United States.

Prue Leith Educates the Nation on Digital Cookies

Renowned celebrity baker, Prue Leith, is helping to educate the nation on digital cookies as research shows that over a third of Brits (35%) don’t know what they actually are or what they do. The research, commissioned by Avast, revealed more than four in five (85%) of UK adults have accepted cookies on a website without reading any of the policies or making any changes, yet nearly seven in ten (68%) agree they could be risking their online privacy by doing so.

What is DLP (Data Loss Prevention)? - DLP Solutions from Lookout

Data loss prevention (DLP) involves a set of technologies and processes used to discover, monitor and control sensitive data. Why is it so important? Businesses use DLP to prevent data breaches and comply with regulations such as GDPR, HIPAA, PCI DSS, and others. DLP tools allow security staff and network administrators to set business rules that determine what’s sensitive while also providing insight into the use of content within an enterprise.

What Sets SecurityScorecard Apart!

Here are 3 things that set SecurityScorecard apart from the competition: Massive data set: We’ve rated 12 million organizations worldwide. If an organization is not on the data set, it takes us just a few minutes to rate it while our competitors take days to do the same. Huge marketplace of applications and services: We have 100s of partners that enrich the value of our platform.

Datadog on Detecting Threats using Network Traffic Flows

At Datadog’s scale, with over 18,000 customers sending trillions of data points per day, analyzing the volume of data coming in can be challenging. One of the largest log sources internally at Datadog are networking logs. Being able to analyze and make sense of them is critical to keep Datadog secure. To help with the task, we have built a flow analysis pipeline that alerts against network level Indicators of Compromise (IOCs) like IP address, port combinations, and data exchanged.