Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Review API Scanning Prescan Results

In this video, you will learn how to review Dynamic Analysis prescan scan results for an API specification. After creating and submitting a Dynamic Analysis API specification scan, you can return to the list of Dynamic Analyses at any time to check for status updates and to view results. Please note, you must have the Creator, Reviewer, or Security Lead role to be able to view the results of a Dynamic Analysis, unless the results are linked to a Veracode application profile for which you have permission to view.

How Centripetal CleanINTERNET Works

Cyber Threat Intelligence (CTI) enables organizations to understand the current and potential threats to their business. For most, CTI’s full potential has been elusive. Until now. Zero-trust inspection and advanced shielding of all inbound and outbound traffic, powered by proactive intelligence, is the most effective strategy for network security today and is the driving force behind our industry-leading research and almost 60 patented technologies.

What Is Penetration Testing? Benefits And Pen Testing Vulnerabilities

Penetration testing is a way to test the security of your network by simulating an attack on it. This video explains what penetration testing is, why you should use it, and how to find out if your company needs one.#penetrationtesting #pentesting #pentests Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.

What is PCI penetration testing? Requirements and Benefits

PCI testing is an important part of running a successful business. But what does it mean? And when should you do it? Watch this video to learn the requirements and benefits of PCI penetration testing, so you can start protecting your company from cyber-attacks!#pcidss #pentesting Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.

Ep 4. Securing the Digital Supply Chain - Ken Carter, Jacob Elziq

We talk about supply chain risk, GDPR, Data Audits, how companies can make sure their processes for transferring data to 3rd parties remain on track. Jacob highlights the interplay between DevOps and security. A very interesting discussion indeed. For full disclosure - Armature Systems is a partner of Riscosity, and helps clients with purchasing, deploying, and operationalizing Riscosity's platform..

How to Protect Your CI/CD Pipeline

Application Architecture Summit, January 2021 How to protect your CI/CD pipeline so it doesn’t turn into a vulnerability superspreader. CI/CD pipelines bring so much application security good to the development process. They help increase test coverage and reduce human error by automating away toil. But without proper controls, an over-privileged and insufficiently monitored CI/CD pipeline can turn into a vulnerability superspreader. This talk will show you how to manage identity-based access so your CI/CD pipeline stays secure using the open-source solution Teleport and Github Actions.