Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Who is responsible for bot management | Webinar series part-3

At Netacea, we wanted to know just how aware businesses are of bots and if they fully understand the threat to their organisation. Which roles are responsible, how confident are they in their bot mitigation strategies, and how well-placed is this confidence? We surveyed 200 enterprise businesses across travel, entertainment (including online gaming and streaming), e-commerce and financial services to get a broad picture of how bots are understood and protected against.

The State of Bot Attacks in 2020 | Bot Management Review Series Part 1

In 2020 the poor security of other businesses is now very much, your problem. While you might be protecting your customers’ credentials with the best possible security, lax measures elsewhere mean those very same credentials are readily accessible for purchase. Increasingly sophisticated bots are used to validate the millions of stolen credentials against login forms. And yet, these bots are no longer only targeting high-value goods and accounts but hijacking and selling streaming and food delivery accounts.

The Four Industries Most Vulnerable to Bot Attacks

At Netacea, we wanted to know just how aware businesses are of bots and if they fully understand the threat to their businesses. Which roles are responsible, how confident are they in their bot mitigation strategies, and how well-placed is this confidence? We surveyed 200 enterprise businesses across travel, entertainment (including online gaming and streaming), e-commerce and financial services to get a broad picture of how bots are understood and protected against.

View Dynamic Analysis Results

In this video, you will learn how to view Dynamic Analysis results. Veracode Dynamic Analysis is a Dynamic Application Security Testing (DAST) solution that delivers an automated and scalable dynamic scanning capability that enables broad coverage at speed. Because security threats are always evolving, organizations need a product that enables them to start scanning quickly and scale when the security programs and coverage increase.

How to Deploy CurrentWare for Offsite Devices - Remote Employee Monitoring Software

Want to monitor and secure employees who work from home? With CurrentWare’s remote employee monitoring and cybersecurity software, you can improve employee productivity, data security, and business intelligence with advanced awareness and control over how technology is used in your organization.

Splunk SOAR Feature Video: Case Management

Case management functionality is built into Splunk SOAR. Using workbooks, you can codify your standard operating procedures into reusable templates. Splunk SOAR supports custom and industry standard workbooks such as the NIST-800 template for incident response. You can divide tasks into phases, assign tasks to team members, and document your work.