Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Introducing Kroll's Third-Party Notification Platform

Kroll’s third-party breach management platform cuts through the complex logistics of coordinating breach notification for a compromised entity and the consumer-facing organizations with which they work. Watch this video to see how we help clients navigate through the complexities of breach notifications with third-parties.

Transform your Data Center with Confidence | Joint Webinar by CloudFabrix and Verge.io

Verge.io is partnering with CloudFabrix, a leader in artificial intelligence for IT operations, to chat about why software-defined everything is the way to go. This is a great opportunity to learn how to transform your current data center operations using the latest technology and intelligence. Here’s what we’ll cover: – How artificial intelligence and data center virtualization operating systems work together to change the thinking around traditional data centers.

Cyber Defenders Defending Critical Infrastructure Interview with Aaron Cockerill

Nextgov interview with Aaron Cockerill for a conversation shaped by today’s topics of critical infrastructure and cybersecurity threats. Discussing everything from phishing attacks to hybrid-remote work best practices, this interview offers insight into how Lookout can help both public and private organizations address digital threat prevention, providing relevant context to the cybersecurity world going forward.

SANSFire: An Alert Has Fired. Now what?

While the security industry spends a lot of time and energy getting more and/or better alerts, comparatively little investment has gone into helping analysts operationalize and contextualize those alerts. This webcast will discuss how a solid foundation of network telemetry can enable not only high-velocity, high-confidence processing of alerts of all stripes, but also a host of other critical security applications, from fundamentals like asset management to advanced techniques like proactive threat hunting. Real-world examples and code will be used throughout the talk, along with practical considerations for operating in an enterprise environment.