Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Cloud File Sharing for Managed Service Providers (MSPs) Overview

In this video, Director of MSP Community and Enablement, Eric Anthony, gives an overview of Egnyte and how you can tailor our cloud file sharing tool to the needs of your clients. As a Managed Service Provider or MSP, referring your clients to resources that best fit their needs is imperative to fostering a long-term working relationship. At Egnyte, we give you the support you need to help your clients make informed decisions to keep collaboration simple, adhere to industry-specific regulations, and most importantly, keep their data secure.

Ugly Sweaters, Season's Greetings, and Cybersecurity Advice - Charge Up Coffee

Running a small business has a never-ending list of tasks that needed to be done yesterday. WatchGuard’s network of service providers helps business like Charge Up Coffee Shop keep their customers and employee secure so they can focus on their products.

Log4Shell: What You Need to Know About the Log4j Vulnerability

A new critical vulnerability, Log4Shell, was publicly disclosed on December 10th and is making global headlines. It impacts a wide amount of applications on the internet, allowing attackers to remotely execute code within vulnerable applications worldwide. In this webinar recording, Snyk technical experts provide an in-depth technical review of the Log4Shell vulnerability, what caused it, how it can be exploited, and most importantly, how it can be mitigated through upgrades, or defended against in WAF configurations and more. We cover.

Fireside Chat: Log4j and Injection Flaws

Join us for a fireside chat with Micah Silverman, Snyk's Director of DevSecOps Acceleration, and Vandana Verma, Security Relations Leader at Snyk, as we answer your #Log4Shell questions: What is it and how does it affect us? How do I find and fix the #Log4J vulnerability? What can other language ecosystems learn from this? We'll also talk about the OWASP Top 10 and injection flaws.

Information Security Controls | Different Types and Purpose Explained

Information security controls are a critical aspect of information technology and an integral part of safeguarding your company’s data. This video provides an overview of the types and purposes of different security controls, including firewalls, intrusion detection systems (IDS), and encryption.

Practice vs Maturity in CMMC 2.0 Framework

When CMMC was first introduced by the DoD, its purpose was to “normalize and standardized cybersecurity preparedness across the federal government’s Defense Industrial Base or DIB.” Essentially, they recognized a weakness in cybersecurity hygiene practices in their supply chain, and so CMMC became the standard the DIB would be “graded” by to ensure the protection of sensitive or Controlled Unclassified Information (CUI).