Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Splunk CEO Gary Steele and Juliana Vida discuss GovSummit 2022 and Compete in Coffee Talk Challenge

In a special GovSummit edition of Coffee Talk with SURGe, Splunk CEO Gary Steele and Juliana Vida, Chief Technical Advisor for the Public Sector discuss GovSummit 2022 and what cyber resiliency means to them. They also face off in a challenge to guess whether different security marketing terms are real or fake.

Webinar: 2023 Security Predictions - 15 Dec 2022

Every year, the WatchGuard Threat Lab team likes to dust off the crystal ball and predict the way cyber threats and information security will evolve going forward. Though we base our forecasts on quantifiable trends we’ve seen in the past, we also take the opportunity to extrapolate the more futuristic and dystopian cyber outcomes that might occur if attackers were left unchecked. In the end, our goal is to share how defenders must adjust to ensure we avoid the worst outcomes.

Going Beyond Unit Testing | How to Uncover Blind Spots in your Java Code with Fuzzing

Check out fuzz.ci/cli to try out the tool for yourself! While most Java developers already use unit testing to test whether their application behaves as expected, complementary testing approaches such as fuzz testing enable them to also check their applications for unexpected or strange behaviors that could lead to crashes and make them vulnerable to Denial of Service (Dos) attacks or Zero-Day exploits.

MSPs! The Power of Octiga Office 365 Baselines Templates

Octiga makes it possible to redeploy your MSP’s best-practice security posture consistently, across multiple clients. Set a template posture for your clients and easily manage them in a single click whenever a baseline update is required. Apply & maintain continually and cohesively in a few seconds.

Security Awareness

Why is security awareness important when we have all of these appliances and software and hardware to protect us? Well, ultimately, attacks come down to a set of human eyes and a keyboard, and a mouse. And if a user is well educated and if they're trained well and they're astute, they can help prevent a security incident from ever happening or detect it.

Webinar: Introduction To Cloud Security & IAM Policy Configuration Level Review

Through this webinar, we aim to help enterprises & individuals understand about cloud security and I-AM policy can play a role to build safe and secure mobile apps that garner trust. It will help you to prevent sensitive data loss and infrastructure exposure, resulting in fraud, reputation damage, and regulatory penalties.