Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

The Future of Cyber Security Manchester: What Are Bot Attacks?

Netacea's General Manager, Nick Baglin, talking about a new approach to bots and account takeover at The Future of Cyber Security Manchester 2019. This presentation will reveal the true extent of the bot problem and what you can do to solve it using behavioural machine learning that identifies even the most sophisticated bots.

Fighting back at bots with Scott Helme

Humans have become a minority of internet users, with automated bot traffic accounting for more than half of all internet traffic. However, most businesses do not know the composition of their web traffic, or what that traffic is doing on their websites. A trillion-dollar cyber-crime business has been born out of this environment, at the expense of organisations around the world. As the cyber threat grows, the internet is becoming increasingly unfair and driving businesses to spend roughly $88bn on cybersecurity, with this figure predicted to increase by 1,200% to $1tn in 2021.

When robots strike: The hidden dangers of business logic attacks

When organisations consider how to protect their web applications from attacks, they often focus on security scans and pen tests to identify technical security flaws. While this is absolutely correct, there is another risk that often remains undetected until it is too late: business logic attacks.

Uncovering Bots in eCommerce Netacea Webinar

Up to 40% of traffic to an eCommerce site consists of automated bot traffic, but many eCommerce sites lack the visibility required to accurately identify human traffic vs. good and bad bots. Watch the webinar recording and hear from guest speakers from leading eCommerce organizations who discuss what bots mean for them in 2020, the challenges facing technology leaders and their approaches to managing bot traffic.

The Devil's in the Dependency: Data-Driven Software Composition Analysis

We all know that lurking within even the most popular open source packages are flaws that can leave carefully constructed applications vulnerable. In fact, 71% of all applications contain flawed open source libraries, many (70.7%) coming from downstream dependencies which might escape the notice of developers. Using graph analytics and a broad data science toolkit, we untangle the web of open source dependencies and flaws and show the best way for developers to navigate this seemingly intractable game of whack-a-mole.

ManageEngine PAM360: An overview

PAM360 is a comprehensive solution for businesses looking to incorporate PAM into their overall security operations. With PAM360's contextual integration capabilities, you can build a central console where different parts of your IT management system interconnect for deeper correlation of privileged access data and overall network data, facilitating meaningful inferences and quicker remedies. In this video, our product expert will give you an overview of PAM360 software.

CurrentWare v5.5.2 Webinar (Q4 2020) | Audit Logons, Compare Productivity by Location, and More!

😀 CurrentWare v5.5.2 IS NOW LIVE! 😀 CurrentWare webinar for version 5.5.2, released October 2020. In this video CurrentWare’s managing director Neel Lukka and product manager Sai Kit Chu demonstrate the new features and reports. They also discuss the latest improvements to the products and go over an overview of the latest CurrentWare company developments.