Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top 5 Benefits of Remote Screen-Casting iOS Work Devices

Let’s explore how remote screen-casting on iOS devices can revolutionize your business operations. From enhancing IT support efficiency to improving employee training and ensuring compliance, discover why integrating screen-casting tools is a strategic move for modern enterprises.

EP 6 - Incident Response POV: 2025 Emerging Threats

In this episode of Security Matters, host David Puner, dives into the world of evolving cyberthreats with Bryan Murphy, Senior Director of CyberArk's Incident Response Team. Imagine a scenario where an attacker uses AI-generated deepfakes to impersonate your company's VP of finance, gaining unauthorized access to your environment. Bryan Murphy shares insights on how these sophisticated attacks are turning identity into the attack surface and why your first line of defense might be as simple as a video call.

EP 6 - Incident Response POV: 2025 Emerging Threats

In this episode of Security Matters, host David Puner, dives into the world of evolving cyberthreats with Bryan Murphy, Senior Director of CyberArk’s Incident Response Team. Imagine a scenario where an attacker uses AI-generated deepfakes to impersonate your company’s VP of finance, gaining unauthorized access to your environment.

One Identity Fabric: Integrated solutions with responsible AI

Deploy a cloud-native solution at record time and low cost – One Identity CEO Mark Logan explores the benefits of One Identity Fabric to your environment. Join Mark Logan, CEO at One Identity, to delve into the use of best-in-class artificial intelligence (AI) within One Identity solutions.

Whole-of-State Cybersecurity: A Unified Approach to Protecting Government

In today’s era, where the digital landscape is as critical as the physical, the urgency to adapt and reinforce our cybersecurity infrastructure is more pressing than ever. For government operations, where data breaches and cyberattacks frequently make the headlines, adopting a whole-of-state approach to cybersecurity isn’t just a precaution—it’s a strategic imperative to protect our communities and safeguard our future.

Unlocking New Jailbreaks with AI Explainability

In this post, we introduce our “Adversarial AI Explainability” research, a term we use to describe the intersection of AI explainability and adversarial attacks on Large Language Models (LLMs). Much like using an MRI to understand how a human brain might be fooled, we aim to decipher how LLMs can be manipulated.

Drupal Single Sign On - Okta as IDP

This video will walk you through the steps required to configure Okta as an Identity Provider and Drupal as a Service Provider. The module allows users to log in to the Drupal site using their Okta account. Chapters: Don't forget to subscribe to our channel and click on a bell icon to get notifications about new uploads.

HR-Driven Identity and Access Management: Mini OneLogin Demo

Managing employee identities is a shared responsibility between IT and HR. OneLogin simplifies this with automated lifecycle management, connecting accurate HR data to IT systems for seamless account creation, updates and access control. Employees get fast, secure access to apps through a centralized portal.