Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Ukraine Russia Conflict Roundtable | 3/22/22 | NeoSystems

Join NeoSystems and leading government and industry cybersecurity executives for a roundtable discussion on the Ukraine Russia Conflict and its cybersecurity implications. We'll discuss Russian cyber activities and examine strategic initiatives to defend the United States against cyber-attacks. Topics Covered Include: Moderator: Bryan Ware – CEO and Founder, Next5, Entrepreneur, former Director of Cybersecurity, CISA

Licensed Custodians vs. Self Custodians for Digital Assets

In 2022, many financial institutions across the globe are investing in digital assets. The crypto market now has a market cap of more than $2 trillion, and the number of crypto wallets has ballooned to 260 million. If your organization is looking to invest in the space – or already has – you may be wondering, “Do we need a ‘qualified cryptocurrency custodian’ to hold our digital asset investments?”

Random but Memorable - Episode 9.1: Nightmare Villain Bug Bounty

On today's episode we're unveiling 1Password's exciting new developer tools with our VP of Product Management, Tony Myers. Settle in for This Week at 1Password to learn more about the new SSH capability, CLI 2.0, our developer docs portal, and the frictionless workflow developers can expect. We also grimace our way through the security news in Watchtower Weekly (much like our reaction to rising gas prices) – you might want to think twice about checking prices using privacy-guzzling GasBuddy. ⛽️

WhiteSource SCA Administration - User Interface Walkthrough

WhiteSource provides a simple yet powerful solution for companies to manage open source components in their application. WhiteSource is designed for security and software development teams, to give managers the control and visibility over the vulnerabilities in their app and developers to tools to quickly fix what matters. The following video is a brief overview the of user interface and some of the feature functionality within.

Ransomware Attacks: How to Mitigate Risk and Protect Your Data

Ransomware is not a new threat, but the tactics that attackers are using to access corporate infrastructures and steal resources has evolved. With the continuation of remote work and data being stored on the cloud, attackers only need to compromise one user, app or device to gain access. Learn more about how these attacks happen.

Attack Surface Assessment: What are they and why do you need them? | Cyphere

Digital attack surface assessment is the process of identifying and quantifying the security risk associated with the interactions between an organisation's IT assets and its external environment Organisations need to be aware of their attack surface in order to identify and mitigate potential security risks. An attack surface assessment can help organisations understand where these risks lie and take steps to reduce them

2022 Challenger Interview: Vonahi Security + Decipher Cyber

The Decipher Cyber Jenny Challenger Interview features Alton Johnson, CEO and Founder of Vonahi Security, and Karissa Breen, Founder of KBI, the marketing & media company dedicated solely to the cybersecurity sector. About Vonahi Security: Vonahi Security is a cybersecurity company that developed vPenTest, a SaaS platform that automates network penetration testing and delivers continuous testing at a fraction of the cost of an outsourced consultant.