Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Demo: Using Netskope policies to deliver Okta authenticated access to any cloud application

When Okta is integrated with Netskope's Next Generation Secure Web Gateway (NG SWG) it becomes possible to apply strong authentication to any cloud application. This demo shows how Netskope can challenge a user for Okta authentication when they attempt to access an unmanaged cloud application.

Demo: Using Netskope policies to deliver Okta authentication challenges based on risky user behavior

When Okta is integrated with Netskope's Next Generation Secure Web Gateway (NG SWG) it becomes possible to challenge users for authentication when they perform risky activities. In this example, the uploading of sensitive data to a cloud application will trigger an authentication challenge before allowing the activity to complete.

Demo: Netskope preventing data exfiltration to personal devices from cloud apps managed by Okta

When Okta is integrated with Netskope's Next Generation Secure Web Gateway (NG SWG) it becomes possible to apply data protection policies to unmanaged devices accessing managed cloud applications. These policies are typically configured to prevent the downloading of sensitive data from cloud applications to personal or BYOD devices.

Should You Consider a Managed SIEM Service?

While a SIEM is a vital tool for monitoring networks, could a Managed SIEM service make an impact on your business? This video will answer the questions: What is a SIEM? What is Managed SIEM? Questions about Managed SIEM Pricing. Is Managed Security Right for You? Managed SIEM Use Cases Benefits of Managed Services vs. In-House Services

Myth Busting 101: Challenging stereotypes and grasping opportunities

As women in tech, the stereotypes put upon us – and particularly those we accept, internalise and resign ourselves to can become the mantras of our whole careers. From “not being technically minded enough” to being “unable to cope with the demands of the job”, our gender and ethnicities can dictate the positions we apply for and hold, and how far we’ll climb.

How will comply-to-connect (C2C) help you with compliance assessment?

“Trust but verify” is a common phrase in the DoD, usually referring to managing people or tasks. In order to build trusted network environments, cyber administrators need to know that their security and management tools are working properly, and that connecting endpoints and users are compliant with security policies. So how will C2C capabilities help you with compliance assessments?

How will comply-to-connect (C2C) help you gain control?

Zero Trust, Access Control, Least-Privileged Access -- call it what you want, trust within a network is an opportunity for Administrators to excel … or get fired. Administrators must continually balance user access to mission data and services with security measures to protect those functions, and policy-based automation is the only way to keep up. So how will C2C capabilities help you gain control?