Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Things to Remember While Scaling Your Business

Here are 2 things that helped us successfully scale SecurityScorecard: Having a customer-first mentality: You need to understand your customers deeply. You need to adopt Amazon’s empty-chair approach where the most important voice is the customers’ voice, not the CEOs’. Beginning with the right foundation: Here’s what most companies get wrong: When they start up and have 10-20 people, they focus on their customers.

Build and Configuration Review Services: What are they and what do they offer?

Cyphere has a build and configuration review service that helps you to identify issues with your OS, device builds and configurations. In this video, we take a look at what Cyphere offers and discuss whether or not it's the right choice for you.#buildreview #buildconfiguration Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.

Introduction to Active Directory Security

Active Directory (AD) is legacy technology that was not designed for modern attacks – yet it is still relied on by over 90% of the Fortune 1000 companies. This video highlights how modern attacks like ransomware exploit this “weakest link in your cyber defense”, and why this is a problem you cannot afford to ignore.

Proactive Compliance Verification for Network Security

Regulatory compliance can cost teams valuable time and money. Forward Enterprise's security posture verification can relieve this burden and prove that your network behavior conforms with corporate policy intent in real-time. In this demonstration, Technical Solutions Architect, Glen Turner shows us how operators can use Forward to prove the network meets PCI DSS regulatory requirements.

CloudFlow: Application Centric Risk Analysis And Remediation Using Tags

In addition to the ability to filter risks for cloud types, accounts and regions, you can now focus your risk analysis and remediation on specific categories of risks identified by tags (key/value combinations) applied to the cloud platform assets. Customers can leverage this capability to focus on analyzing and remediating risks related to specific applications.

The Comprehensive Approach to Cybersecurity Assessment and Testing | Cyphere

Cyphere is a cybersecurity assessment and testing company that quickly identifies the weakest points in an organisation's cyber security. We do this by using the best practices to simulate real-world attacks against your systems. The goal is to identify potential risks before they can lead to a potential disaster.

Security at ServiceNow (feat. Karl Klaessig) - The Big Fix 2022 by Snyk

Karl Klaessig, Director of Product Marketing and Security Operations at ServiceNow joins Randall Degges, Head of Developer Relations and Community at Snyk to discuss security challenges and how they approach them at ServiceNow. The Big Fix brought together developers, DevOps, and security practitioners of all skill levels to help make the internet more secure through a month of fixing vulnerabilities, ending in a 24-hour livestream event.