Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

LogSentinel SIEM DEMO: How To Use LogSentinel

LogSentinel #SIEM #DEMO Sophisticated dashboards, that can be customised according to user preferences, are also available there. On the threat map, you can see the IP’s locations of the actors who have triggered a #security threat for a certain period. The statistical overview gives valuable insight into the top actions, actors, entities or data sources. What’s more, you can search by user activity and familiarise yourself with a specific actor’s behaviour.

Random but Memorable - Episode 8.8: Secret Agency Space Nerds with Jason Meller from Kolide

Find out how a researcher uncovered a secret German intelligence agency using an Apple AirTag, and how Ozzy Osbourne's (yes, you read that right) NFT project turned into a scam – all in this episode’s Watchtower Weekly. We also invite Kolide CEO and founder, Jason Meller, to discuss user-first endpoint management, empowering the end-user, and creating a culture of security. Plus, Anna gets revenge in Ridiculous Requirements: Capital City edition! 🏙

Understanding Broken Authentication and Session Management

This video is all about understanding broken authentication and session management. You'll learn the difference between HTTP and HTTPS, what it means to "authenticate" a user, how sessions work, and much more!#brokenauthentication #sessionmanagement Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.

How to Use the Snyk CLI to Fix Vulnerabilities in Your Application: The Big Fix

Brian Vermeer, Developer Advocate at Snyk, demonstrates how you can use the Snyk CLI to fix vulnerabilities in your application. Join us for The Big Fix, an event that brings developers and security practitioners round the world to find and fix vulnerabilities. Let's make the Internet a safer and better place than before!

Identity Access Management (IAM) Automation - Intro to Torq Webinar

Security teams are struggling to keep up with the increasing number of attack surfaces and the demands on remediating those attack surfaces in real-time. Security automation is the key to unlocking your security team’s productive potential, but traditional SOAR platforms (Security Orchestration, Automation, and Response) are complex and can take months of development to implement your first automation response sequence.

Evaluating Your Content Management Maturity

In this video, Egnyte’s Director of Value Realization, Karl Becker breaks down content from an AEC perspective. He covers: What is content? Why effectively managing it is so important What are some of the benefits of effectively managing content Becker and his team work with thousands of Egnyte clients and have developed a content maturity model to help them get the most out of their content, no matter where they are on their content journey.