Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

How to Perform Bare Metal Recovery Using the Direct Streaming Method - BDRSuite

BDRSuite - Bare Metal Recovery - Step-by-Step Guide Welcome to BDRSuite How-to series! In this video, we'll guide you through the process of performing Bare-Metal Recovery using the Direct Streaming method. BDRSuite's Bare-Metal Recovery feature is helpful when dealing with complete system failures, allowing you to restore entire systems (Windows Servers or Workstations), to new or existing hardware.

Sue Bergamo on Data Security Decoded - On Diversity

Dive deep into the world of #CyberSecurity leadership in this episode of Data Security Decoded, featuring Sue Bergamo, CISO and CIO at BTE Partners. Sue brings to the table an incredible perspective on the importance of diversity and the strength of unique perspectives. Sue advocates for empowering individuals to stand up for their ideas, especially when navigating through incidents, ensuring a resilient and innovative response to any crisis.

How To Configure PAM with DUO MFA | CyberArk

In this video, we walk you through the step-by-step process of configuring PAM (Pluggable Authentication Modules) and DUO Multi-Factor Authentication (MFA) with CyberArk. Strengthen your security posture and ensure robust access control for your sensitive data and systems. What You'll Learn: Tools and Resources: CyberArk DUO MFA Pluggable Authentication Modules (PAM) Step-by-Step Instructions.

Ransomware: A Major Threat to Data Security with Renata Spinks of CyberSec International

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. Each episode features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience.

Netskope + ChatGPT Enterprise Compliance API

Netskope integrates with ChatGPT Enterprise to deliver API-enabled controls that bolster security and compliance for organizations. With our integration, organizations gain enhanced features including application visibility, robust policy enforcement, advanced data security, and comprehensive security posture management—all achieved by directly connecting to ChatGPT Enterprise.

#DevSecOps Essentials: Operating Confidently with Trusted Packages

Join JFrog’s Senior Solution Engineer, Mike Holland, and Technical Success Manager, Harpreet Singh, as they showcase the power of the JFrog Software Supply Chain platform. Designed to detect third-party components, track dependencies, and enforce compliance, this platform is essential for efficient and reliable software development. In this session, you'll learn.

Emerging technologies

In this insightful discussion, Ashok Kumar Ratnagiri, Associate VP of Information Security at EdgeVerve and Co-Founder of Security BSides Bangalore Community shares his valuable perspectives on the latest technologies and best practices for detecting and preventing ransomware attacks. As ransomware threats continue to evolve and pose significant risks to businesses, it's crucial for organizations to stay ahead of the curve.

Random but Memorable - Episode 13.1: Doughnut Panic Sting Operation with Joseph Cox

Strap yourselves in for a wild ride, as we kick off a new season with the incredible true story of the largest FBI sting operation ever. Cybersecurity author and journalist, Joseph Cox, unpacks his best-selling book, Dark Wire. Learn how the FBI built its own app to wiretap the world and turn the tide on the criminal underground, with privacy implications for everyone. Trust us, you won't want to miss this one.