Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Splunk SOAR Feature Overview: Custom Functions

Splunk SOAR’s custom functions allow you to share custom code across playbooks while introducing complex data objects into the execution path. These aren’t just out-of-the-box playbooks, but out-of-the-box custom blocks that save you time and effort. These capabilities provide the building blocks for scaling your automation, even to those without coding capabilities.

AppSec Decoded: Cyber security measures for technology buyers and suppliers | Synopsys

In this episode of AppSec Decoded, we spoke with Tim Mackey, principal security strategist at Synopsys Cybersecurity Research Center, to learn what proactive steps both technology suppliers and buyers should consider in the wake of the new E.O.

Data Security Summit- Mike Tornincasa and Kevin Mandia

The first 24 hours after a major security incident are critical to keeping your business up and running. What can you do to protect your organization’s valuable data and critical IT assets in the event of a ransomware attack? Come listen to Kevin Mandia, Mandiant CEO and security expert to learn best practices that IT leaders can put into practice today. Hear about the successes (and failures) of other organizations, and how your team can avoid being a victim.