Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Questionnaires: OkCupid vs. Security

What do OkCupid quizzes and generic security questionnaires have in common? More than you might think. James Scheffler, Head of GRC at DataRobot, explains why one size definitely doesn't fit all. That’s why TrustShare allows prospects to conduct a virtual audit and get the information they need from your trust portal. When a questionnaire is unavoidable, our AI-powered solution pre-fills up to 90% with accurate, context-aware answers - and citations to prove it!

3 Crucial Capabilities for Effective Cloud Detection and Response

Adversaries are increasingly attacking cloud environments, as evidenced by a 75% surge in cloud intrusions year-over-year in 2023. They are also getting faster: The fastest breakout time was clocked at just over 2 minutes, according to the CrowdStrike 2024 Global Threat Report. Today’s adversaries are outpacing legacy security approaches. Disjointed point solutions can’t scale or provide visibility into a rapidly growing attack surface.

What is a CDN (Content Delivery Network) and How does a CDN Work?

In this video, we explain what a Content Delivery Network (CDN) is and how it works to improve your website’s performance. If you've ever experienced a slow website, you know how frustrating it can be for both you and your visitors. A slow website can lead to losing customers and lower rankings on search result pages. That's where a CDN comes in. A CDN improves your website's loading times by serving content from the server closest to your visitors. By caching content at various data centers, a CDN reduces the distance data must travel, leading to faster load times and lower bandwidth costs.

What is a DNS (Domain Name System) and How Does a DNS Work?

Explore the essential role of DNS (Domain Name System) in the internet ecosystem with this detailed video. Whether you're navigating the web or managing websites, understanding DNS is vital for optimizing website loading speeds and bolstering cybersecurity.. In this video, we cover: Whether you're a beginner curious about internet infrastructure or a tech enthusiast seeking deeper insights, join us as we unravel the mechanics of DNS. This video provides invaluable knowledge to empower you in navigating the digital world effectively.

Configuring Policies | JumpCloud University Tutorial (2024)

In this tutorial, we'll go over how to configure policies for your JumpCloud managed devices. You can use JumpCloud policies to remotely manage devices in your organization. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.

Exploring the Latest Trends in IoT Security

As our world becomes more connected, keeping up with the latest trends in IoT security is a must for businesses aiming to boost efficiency, enhance customer experiences, and stay ahead of the competition. Let’s dive into the key trends shaping the IoT landscape today and how we are working to make it more secure, from advancements in AI to post-quantum cryptography and cyber resilience.

IoT Security Regulations: A Compliance Checklist - Part 1

The Internet of Things (IoT) refers to the global network of physical devices connected to the internet, capable of collecting and sharing data. IoT devices range from everyday household items to sophisticated industrial tools. By integrating sensors and communication hardware, IoT bridges the gap between the physical and digital worlds, enabling environments where smart devices operate interconnectedly and autonomously.

The IT Hour | Product Roadmap on JCU 06.21.24

Nate Copt joins to show us more on the new product roadmap in JumpCloud University. Join us at 11:30 am ET. The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable.

Navigating the Hybrid Workplace: Balancing Productivity, Efficiency and Security

In today's digital workplace, we rely heavily on a wealth of collaboration solutions; in fact, these tools have become ingrained and part of our daily workflows. Despite hybrid working patterns and the return, for some, to a more traditional work environment, the continued reliance on collaboration apps remains strong. This presents opportunities and challenges for the IT teams tasked with onboarding and offboarding employees and effectively managing an ever-growing plethora of tools and apps.

How to Use Facial Recognition for Face Search

The lives of modern people are becoming increasingly comfortable and productive, all thanks to the rapid advancement of innovative technologies. Nowadays, to communicate with acquaintances, make purchases, and pay for services, all you need to do is connect your device to the internet. Have you lost contact with an old acquaintance? This is easily remedied by Face search person by photo. The principle of search work is as simple as possible. To get the necessary information you should simply upload a photo to the search engine.