Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Securing the Digital Supply Chain Ep. 10 - Peeyush Ranjan

An amazing conversation with Peeyush Ranjan, Engineering VP at a Fortune 50 organization. Peeyush coined an amazing term - "Diffused Responsibility" - this is the reason why we all, in different silos, development, security, GRC, legal have to try harder and pull towards the same goal. In fact the example used - of a sports team, getting the pigskin over the line is a very apt one.

How the Arctic Wolf Platform Stops Active Ransomware

In this whiteboard session, Matt Trushinski, Director of Product Marketing, shows how the Arctic Wolf® Platform can stop ransomware by using a real-life example from a customer. The incident started after a bad actor with stolen credentials logged into multiple systems at 5:23 a.m. Learn the details of how Arctic Wolf's Triage Team began investigating within minutes to alert the customer and stop the active ransomware in its tracks.

Modernize security operations

Evolving cyber threats drive a growing need to achieve real-time situational awareness. Sumo Logic enables a cohesive security strategy by proactively identifying critical insights. Teams need a security monitoring solution that quickly detects potential threats, a modern cloud SIEM solution with contextualized threat insights and a cloud SOAR that automates incident management. Learn how Sumo Logic empowers security teams to modernize security operations.

Cybersecurity Insights - Hybrid Work Models, MSPs Can Transform Your Business

According to a Canalys report, 134 million workers worldwide will either be working remotely or in a flexible work model. That’s 154% higher compared to remote work before COVID-19. When it comes to technology and businesses, there are a lot of trends to suggest how organizations should navigate the hybrid work model. But in the search for efficiency and scalability, what is the best way to keep up?

How the Arctic Wolf Platform Helps Reduce Cyber Risk

In this whiteboard session, Matt Trushinski, Director of Product Marketing, shows how the Arctic Wolf® Platform helps reduce cyber risk by ingesting raw telemetry from a customer's environment and turning it into high-quality, actionable security alerts. Learn how the platform can parse, enrich, and analyze data to improve a customer's security posture over time and harden their environment—and, ultimately, end cyber risk at their organization.

Why it is Vital to Mitigate and Manage Bot Threat

Data from a recent report revealed that bots take up two-thirds of the internet traffic. However, not all bots are safe and well-intentioned. Research further suggests that of in all of the web traffic, nearly 40% is bad bot traffic and around 25% is good bot traffic. Given how destructive bad bots are, it is essential to use a bot protection solution to detect bad bots, manage bot traffic, and mitigate bot threats. Read on to know more about bot protection solutions and how they help organizations.

6 API Security Best Practices for Web Apps

Thinking about all the high-profile cyber threats that businesses face today can make you feel overwhelmed. The most devastating security breach incidents that made headlines, show the incidence of API abuse. Take Venmo, Panera, Equifax, WikiLeaks, and Uber’s hacks for example. With these incidents, it is clear that cybercriminals are becoming smarter, and many businesses are not focusing much on API security.

Important Data Privacy Questions You Should Be Asking Now

Data has become a valuable possession since the boom of technology for the past decade. Massive amounts of data are stored every day in every sector for various reasons. Though all the information collected through various methods is used to create an easy life, many companies take too lightly on data privacy and protection. Data breaches are becoming more frequent due to less consideration of securing the data.

The Bot Problem Why is it Necessary to Mitigate Bot Threats

Data from a recent report revealed that bots take up two-thirds of the internet traffic. However, not all bots are safe and well-intentioned. Research further suggests that of in all of the web traffic, nearly 40% is bad bot traffic and around 25% is good bot traffic. Given how destructive bad bots are, it is essential to use a bot protection solution to detect bad bots, manage bot traffic, and mitigate bot threats. Read on to know more about bot protection solutions and how they help organizations.