Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Arctic Wolf | End Cyber Risk

The cybersecurity industry has an effectiveness problem. There are thousands of vendors in the market, with over $130 billion spent annually on defense. And yet, the number of breaches continues to rise. Data breaches often occur not because a tool failed to detect the threat or alert on a vulnerability, but due to a lack of proper workflows, processes, and experienced people who know how to prioritize remediation.

Multi-Cluster, Multi-Cloud and Hybrid Cloud Networking, Observability and Security Management

Managing networking, observability and security in multiple Kubernetes clusters can quickly become a major challenge. Lack of a centralized, unified multi-cluster approach results in dozens of clusters that are deployed and managed independently throughout an organization, with very little uniformity in the way they are secured. This adds complexity for DevOps teams, who must adapt to different cluster environments.

Automated Validation Scans on Kondukto

Validation scans are great for bridging the gap between software developers and security engineers. Whenever an issue is closed by a software developer, Kondukto automatically triggers a new scan to ensure that the vulnerability has been fixed. If the same vulnerability is identified again, the issue is automatically reopened by Kondukto.

How to Write a Work From Home Policy (Free Template) | CurrentWare

The demand for remote work isn’t stopping anytime soon. Did you know that 77% of employees want to keep working from home after COVID-19? In this video CurrentWare’s managing director Neel Lukka tells you the things you MUST include in your work from home policy. To help you get started we’ve provided a work from home policy template that you can download and customize to fit the needs of your business.

Driving the Cybersecurity Agenda with the C-Suite and Boards

Veracode CEO Sam King joins the Advanced Cyber Security Center, the Boston Globe’s Jon Chesto, MassMutual CISO Jim Routh, and State Street CTRO for a fireside chat about the strategic role the C-suite and corporate boards play in cybersecurity. Sam describes why communication between the board, the C-suite, the CISO, and the security team must be frequent to add value from both a governance and compliance perspective.

The Need for Data Speed: The secret to how E Global secures the end-to-end customer experience

Interested in exploring how Mexico’s largest electronic payments processor consistently secures the end-to-end customer experience while processing more than 13 million credit and debit card transactions each day? We invite you to join Ander Murillo Zohn, Deputy Director of Big Data Technologies at E-Global, and Stacy Gorkoff, VP of Marketing and Channel Development at INETCO, for a 45-minute webinar as they discuss the secret to using real-time data to achieve the best customer experience possible.

Securing Office 365 Made Simple

Do you need to better secure your organisation, your employees and your data? Then start with Office 365. 365 is the backbone of your business (communications, sharing, storage) yet it exposes the largest risk surface. Securing 365 can be complex and time-consuming. Let us demystify it, get you secured easily and quickly, whilst saving time and money.