Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Splunk SOAR Feature Video: Playbooks

Splunk SOAR playbooks automate security and IT actions at machine speed. Playbooks execute a sequence of actions across your tools in seconds, vs hours or more if you perform them manually. Splunk SOAR comes with 100 pre-made playbooks out of the box, so you can start automating security tasks right away. Splunk SOAR’s visual playbook editor makes it easier than ever to create, edit, implement and scale automated playbooks to help your business eliminate security analyst grunt work. *Users can build and edit playbooks in the original horizontal visual playbook editor, or the vertical visual playbook editor introduced in August 2021.

Spotlight on Technology: Privileged Access Management

In the second of our new series, Spotlight on Technology, we take a look at privileged access management with James Rees MD of Razorthorn cyber security consultancy, & David Higgins, EMEA Technical Director of CyberArk, leaders in identity security and access management. Accounts with privileged access are gold dust for malicious actors and gaining access to these, and the sensitive data these accounts have access to, can cause some huge and costly problems for the targeted organisation.

CISO Insider - S2E6 - Data is trust with Emilio Escobar

Datadog CISO Emilio Escobar joins Chris Martinez on CISO Insider for a discussion on data security approaches for today’s cloud-first world. Emilio shares how he sees infosec: creating security responses based on people and teams over brute force blocking of apps and systems. This approach allows Datadog to defeat the enemy of complexity in IT service quality, and helps build a more inclusive culture at the company. By seeing data as trust, Emilio can influence his teams to find better solutions to data security problems and learn from typical pain points. We get into all this and a lot more in the chat today.

Bughunting your React web applications using DevTools

What if I told you that simply using Redux DevTools we will be able to bypass security gates that you didn't realize you have open? Building modern web applications still leaves out many room for mistakes, and even using frameworks like React, requires adhering to many security practices, in order to get things right for security. Otherwise, you risk exposing your web applications to vulnerabilities that others can exploit.

Hello CISO - Episode 1 (Part 1): The Downfall of On-Premise Security

In the beginning, there was on-premise. Then things got complicated. Hello CISO is a new series aimed at Chief Information Security Officers, IT security teams, and all other members of an organization responsible for maintaining the safety and integrity of the business and its operations. "The responsibilities of the modern CISO are expanding as digital infrastructure grows more complex. It’s no longer feasible to protect against every single threat, so you have to think more strategically. We need to work smarter, not harder – and that’s what I want to explore in this series."

Brain Break from Fal.Con for Public Sector: Wizard Spider Threat Intel Highlight

Wizard Spider is a criminal group behind the core development and distribution of a sophisticated arsenal of criminal tools that allow them to run multiple different types of operations. This interview with Nina Padavil, Strategic Threat Advisor, CrowdStrike, and Robert Bruno, Commercial Illustrator, will highlight Wizard Spider’s targets, tactics and motivations. You don't have a malware problem, you have an adversary problem – stay ahead of the adversaries and learn more at the Adversary Universe.

Hacker-Powered Security

This episode is a deep dive into how startups can leverage the power of crowd sourced hackers to find bugs and security issues in your apps. Ben Sadeghipour has over 685 vulnerabilities found in major sites such as Snapchat, AirBnB and even the U.S. Department of Defense, Hacker One helps companies by providing tools to help with response assessments and running their bug bounty programs.