Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

The PCI DSS Series - Top 10 Myths

There are plenty of myths and misconceptions around PCI DSS. This video guides you through this minefield - making sure you understand each myth can not only make the PCI DSS compliance process easier but also more successful. Jim shares his 10+ years' experience as a QSA to explain where these misconceptions come from and how to successfully work around them.

On-Premise or SAAS: What Cyber Security Products to Use? (Cybersecurity Roadmap Webinar Cuts)

What to add to your #cybersecurity roadmap? [What Security Products to Use] It is no secret that cybersecurity has grown in importance, but many companies still assume that cybersecurity products require a big budget which makes them unaffordable for small and medium enterprises. This, however, is not necessarily true. During this webinar, we review several important security solutions and hires to add to your 2021 roadmap, as well as tips on how to defend the need for them in front of senior management or the board, and how to find a solution that both guarantees your company security, and is affordable for your organization.

Outpost24 - Full stack vulnerability management and security assessment

We don’t think it’s fair that businesses are targets of cybercriminals. That's why we’ve created the most complete security assessment platform to help our customers tighten their 'full stack' security exposure before their business can be disrupted.

Should Paying a Ransom be Illegal?

We're never ones to shy away from a good debate, as you'll know if you've been following us for a while. It's a popular opinion at the moment, if you follow the chat online, to make it illegal to pay the ransom following a hack which, in theory, certainly has some merit... Unless you've been living under a rock recently, you'll know that ransomware attacks are on the rise and despite the hackers supposedly having certain 'ethics' about avoiding essential service providers, it seems that no organisation is safe from attack.

Introduction to Bytesafe in 1 min

A quick introduction to secure package management with Bytesafe. Your code is your business and we know how hard it can be to manage JavaScript securely. With Bytesafe you have a secure by default solution that continuously monitors your dependencies. Learn more: When working with JavaScript packages, securing your software supply chain should be a priority. Stay up to date with insights of the open source code you use and issues that need to be remediated.

Working From Home - Is It Safe? (Cybersecurity Roadmap Webinar Cuts)

It is no secret that cybersecurity has grown in importance, especially in a work-from-home world. During this webinar, we review several important security solutions and hires to add to your 2021 roadmap, as well as tips on how to defend the need for them in front of senior management or the board.