Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Use Case | Merged Snapshots: Full visibility, regardless of administrative boundaries

Mike shows how the Merged Snapshots feature within Forward Enterprise helps an organization map and model a network with several distinct administrative boundaries. The Merged Snapshots feature allows users to take snapshots of multiple domains and merge them together to see how packets flow through all domains.

Reveal Your Network's Hidden Weaknesses with KnowBe4's BreachSim Data Exfiltration Simulator

As cyber threats evolve, the target has become crystal clear: your data. A staggering 90% of ransomware attacks now include a data exfiltration component. With this in mind, KnowBe4 has introduced a robust free tool, BreachSim, to identify your network's vulnerabilities and shore up your cyber defenses. Financial losses, reputation damage, intellectual property theft, regulatory repercussions and operational disruptions are just a few of the harsh consequences of data exfiltration assaults. KnowBe4 BreachSim can help you nip these risks in the bud.

Secure Access to Private Apps with ZTNA with Lookout

In today's remote work landscape, Lookout Secure Private Access redefines secure connectivity by eliminating the complexity of VPN setups and additional software. It seamlessly integrates into existing workflows, allowing users to access critical resources effortlessly while maintaining security. By leveraging continuous, contextual policies and machine learning, it enhances security beyond basic authentication, adapting to user behaviors and evolving threats in real-time. Its application cloaking technology ensures that private apps remain hidden from unauthorized access, providing robust protection without compromising flexibility. Simplify and secure your access strategy with Lookout Secure Private Access.

Introducing GitGuardian's Remediation Location & Tracking

Remediation is one of the most challenging aspects of fighting secrets sprawl. Finding exactly the right code to address and then tracking when and how it was fixed can get cumbersome, Especially when dealing with multiple projects and teams. We are proud to Introduce Remediation Location and Tracking to your GitGuardian incidents detail view. With our new Pinpoint location within the Impacted Perimeter view, the platform will organize issues all fixable incidents into the new "Require code fixing" tab helping developers concentrate their efforts.

Discover, Assess, and Protect Confidential Information with Lookout

Learn how Lookout helps identify, classify, and protect sensitive data with real-time data protection and encryption policies. With Lookout's Secure Service Edge (SSE) platform, zero trust data protection policies extend seamlessly across Software-as-a-Service (SaaS), private, and web applications. Experience the simplicity of a unified policy engine that handles masking, redaction, encryption, watermarking, and classification, enhancing both security and administrative efficiency.

Protect Users From Phishing and Malicious Content with Lookout

See how Lookout's phishing and content protection engine enhances security by blocking access to suspicious sites. Discover how remote browser isolation technology safeguards against zero-day phishing sites, preventing credential theft and malicious code execution on endpoint devices.

The most common entry points for ransomware attacks

In this insightful discussion, Anand Prahlad, CEO and President of Parablu, poses a crucial question about ransomware threats: "What do you think are some of the most common entry points for ransomware into organizations? And do you think organizations are doing enough to defend themselves in these vulnerable areas?" Ashok Kumar Ratnagiri, Associate VP of Information Security at EdgeVerve and Co-Founder of Security BSides Bangalore Community, shares his expert insights on this pressing issue.

Detours Ahead: How IT Navigates an Evolving World

We asked, 600+ IT pros answered. See the full survey findings and discover how other IT experts across the U.S. and the U.K. are navigating security threats, shadow IT, AI, and other pressing topics in our latest SME IT Trends Report. 50% report being more concerned about their organization's security posture than they were six months ago, and only 10% of respondents have no plans to implement AI.

Protect Against Sensitive Data Loss on GenAI Platforms with Lookout

Explore how Lookout Secure Internet Access protects sensitive data when using generative AI sites. Learn about the risks associated with inadvertently exposing company details or personal information through these platforms, and discover proactive measures to prevent data leaks. Understand how Lookout enables organizations to strike a balance between innovation and security by selectively allowing access to approved generative AI sites. Explore the implementation of data loss prevention rules that identify and block sensitive information from being shared.