Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Sharpen your security skills with open source! Introduction to modern infrastructure access

Secure access to complex computing environments is hard to get right. Introducing the open source identity-aware access proxy: Teleport. It is used by engineers at smart companies Nasdaq and Google, to easily access all to their computing resources — SSH servers, Kubernetes clusters, or databases. For security professionals, Teleport uses short-lived certificates, audit logs, and session recordings to make it easier to achieve high security standards and compliance.

The Callback is Coming From Inside the House

This bone-chilling webinar will cover: A spine-tingling hands-on-keyboard scenario of a motivated and capable insider threat working with the ghoulish adversary. Use of realistic and terrifying exploits and offensive security tools to simulate adversary TTPs, and how organizations are able to hunt for them. A practical threat hunting session demonstrating true behavioral hunting that walks participants through not only how the attack was carried out, but also how they can hunt for this insidious behavior in their own environments.

PAM: A Modern Approach

This short video explains how to thwart cyberattacks by eliminating privileged accounts using a modern approach to privileged access management. To learn more about managing privileged accounts, visit netwrix.com/pam. Traditionally, businesses have maintained dozens or even hundreds of privileged accounts to support critical IT administration activities. These powerful credentials pose a major security risk because they can be stolen by attackers or misused by their owners, either unintentionally or intentionally.

Lookout ZTNA - Intro to onboarding an application, securing access and protecting sensitive data.

In this Lookout ZTNA demo video, you will see how to onboard an application that is within your corporate network, how to secure access to the application using identity-driven policies and how to apply data protection policies to protect sensitive data.

AppSec Decoded: Why Biden's executive order should be on your radar | Synopsys

Biden’s executive order (EO), announced earlier this spring, outlines cyber security standards and best practices that will apply to federal departments, agencies, and their technology suppliers. Although the EO’s goal is to secure the U.S. government, implications are expected to be broader and could be adopted by the commercial sector. We spoke with Tim Mackey, principal security strategist at Synopsys Cybersecurity Research Center (CyRC), to learn how Biden’s EO differs from prior EOs and why it should be on everyone’s radar.