Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Optimizing Threat Hunting Operations: The CISOs Guide to Efficient and Effective Security Operations

Threat hunting is a proactive approach to detecting advanced threats that may bypass traditional security measures. However, many CISOs struggle with implementing effective threat hunting operations due to a lack of visibility and resources. This webinar will address the complexities of threat hunting and how LimaCharlie can provide the tools and insights needed to optimize these operations.

Teleport 16: Advancing Infrastructure Defense-in-Depth with Device Trust, MFA, and VNet

Join us for an in-depth look at the latest release of Teleport. Teleport 16 introduces several powerful new features that further advance its capabilities in defending against identity provider compromise. In this webinar, we will explore how Teleport 16 enhances security and simplifies secure infrastructure access through: Teleport Access: Teleport Identity: Teleport Policy.

DORA Compliance: Insights & Strategies with Paul Dwyer | Razorwire Podcast | Razorthorn Security

The deadline for financial entities is looming – get actionable information and advice on DORA compliance with industry expert Paul Dwyer! Welcome to Razorwire, your go-to podcast for cutting-edge insights and expert analysis in the world of information security. I'm your host, Jim, and in today's episode, we have the privilege of speaking with Paul Dwyer, a veteran in cybersecurity risk and compliance with over 30 years of experience and the head of the International Cyber Threat Task Force (ICTTF).

Sue Bergamo on Data Security Decoded - On Diversity

Dive deep into the world of #CyberSecurity leadership in this episode of Data Security Decoded, featuring Sue Bergamo, CISO and CIO at BTE Partners. Sue brings to the table an incredible perspective on the importance of diversity and the strength of unique perspectives. Sue advocates for empowering individuals to stand up for their ideas, especially when navigating through incidents, ensuring a resilient and innovative response to any crisis.

How To Configure PAM with DUO MFA | CyberArk

In this video, we walk you through the step-by-step process of configuring PAM (Pluggable Authentication Modules) and DUO Multi-Factor Authentication (MFA) with CyberArk. Strengthen your security posture and ensure robust access control for your sensitive data and systems. What You'll Learn: Tools and Resources: CyberArk DUO MFA Pluggable Authentication Modules (PAM) Step-by-Step Instructions.