Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Multi-Faceted Investigation Methodology

When incidents or traumatic events occur, there are a set of investigative techniques and methodologies that need to be deployed quickly and with the right expertise. In this episode of Kroll’s Security Concepts, three of Kroll’s investigative experts Marco De Bernardin, Francesca Castelli and Nick Doyle come together to discuss their experience with the lifecycle of investigations.

CloudCasa Demo - How to Install the CloudCasa Agent from the SUSE Rancher Apps & Marketplace

Watch this short video to learn how to install the CloudCasa backup agent on your Rancher clusters from the Helm chart in Rancher Apps & Marketplace. Use the CloudCasa free service tier to protect your cluster resource data and create and manage snapshots of your persistent volumes, with no limits on the number of snapshots, worker nodes or clusters.

Anatomy of a Data Breach - How to Protect Your Clients and Brand

Industry veterans Brian Lapidus and David White recently hosted a 40-minute dive into data breaches, how to expedite your response and what to expect when facing a breach of sensitive data, regardless of how it happens. The session was followed by live Q&A. Together, Brian and David have responded to thousands of data breaches worldwide and supported over 300 million customers safeguard their identity.