Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Hardening Infrastructure Security Against SSO Identity Provider Compromise

In an era where Identity Providers (IdPs) have become prime targets for cyber attackers, relying solely on single sign-on (SSO) authentication can leave organizations vulnerable to various sophisticated threats such as social engineering, credential stuffing, and session hijacking. Join us for an in-depth webinar to explore how Teleport is redefining infrastructure security strategies that protect infrastructure even in the event of identity provider compromise.

Keeper 101 | Enterprise: How to Use Keeper Commander CLI

Keeper Commander allows you to perform administrative and vault functions from a command line environment on Mac, Windows and Linux. You can start Commander by typing “keeper shell” in a terminal window. Enter your username, password, and complete any 2FA requirements when prompted. If you are logging in for the first time on a new device, you may be prompted for device approval for additional security. More information about login methods, such as SSO, can be found in our documentation.

Clico Partner Event 2024 Interview with Ivan Dolensky

Fidelis VP of International Sales, Ivan Dolensky was interviewed by Marcin Prokop at the Clico Partner Event 2024, about how Fidelis Security position itself on the cybersecurity solutions market and the weakness he sees in the current protection and effectiveness of Active Directory security.

Managing Open Source Costs: The CISOs Guide to Efficient and Effective Security Operations

Open source software offers numerous benefits, including flexibility and cost savings, but managing, maintaining, and scaling these tools can become a significant burden for CISOs. As open source solutions proliferate within your organization, the associated costs and complexities can spiral out of control. This webinar will address the challenge of managing open source costs and how LimaCharlie can provide the efficiencies needed to keep these expenses in check.

Uncover vulnerabilities in C# applications using Coverity Rapid Scan Static | Synopsys

In this video you will discover how Coverity’s Rapid Scan Static Analysis can help developers find and fix vulnerabilities in their code early in the development cycle by providing quick feedback on the most impactful issues. This new update in the Coverity 2024.6.0 release highlights how developers can run quick scans for C# applications via the Coverity Rapid Scan Static engine; returning quick and accurate static analysis results related to issues such as deserialization, hardcoded secrets, unsafe API calls, single-file data flow, etc. at record speeds.