Please turn on your JavaScript for this page to function normally.
Capsule8
How to adopt the mindset of continuous security for security operations

In this podcast recorded at RSA Conference 2018, Dino Dai Zovi, co-founder and CTO at Capsule8, talks about what continuous security is, and how you should bring more of this …

handshake
Why collaboration can be a killer app for defense

In this podcast recorded at RSA Conference 2018, Travis Farral, Director of Security Strategy at Anomali, talks about the impact of blue team collaboration. Discover why …

SAP
SAP systems: The threat of insecure configurations

Onapsis researchers revealed a critical security configuration vulnerability that results from default installations in SAP systems which if left insecure, could lead to a …

arrows
The importance of threat intelligence and vulnerability remediation prioritization

In this podcast recorded at RSA Conference 2018, Jimmy Graham, Director of Product Management, Vulnerability Management at Qualys, talks about the importance of threat …

Vera
Securing the digital future with Vera and Canon Solutions America

In this podcast recorded at RSA Conference 2018, Ajay Arora, founder of Vera Security, and Peter Kowalczuk, President at Canon Solutions America, talk about their recent …

ThreatQ Investigations
Bring order to the chaos of incident response and threat investigations

In this podcast recorded at RSA Conference 2018, Leon Ward, VP of Product Management at ThreatQuotient, talks about bringing order to the chaos of security operations, as well …

Fortanix
Fortanix Runtime Encryption: Protect sensitive applications and data in use

Encryption is an effective data protection control, however it’s use is currently limited to data at rest and data in motion. When, an application starts to run, it’s data in …

ArcSight Investigate
Tackle cyber threats in real time with the Micro Focus enterprise security platform

In this podcast recorded at RSA Conference 2018, John Delk, Chief Product Officer and the General Manager of the security product group at Micro Focus, talks about how Micro …

glasses
Cyber risk assessment and disclosure requirements: What’s important to you?

In this podcast recorded at RSA Conference 2018, Jerry Caponera, VP cyber risk strategy at Nehemiah Security, offers some interesting thoughts on cyber risk assessment and …

Absolute
Solving the dark endpoint problem with increased visibility and control

In this podcast recorded at RSA Conference 2018, Richard Henderson, Global Security Strategist at Absolute Software, and Todd Wakerley, EVP of Product Development at Absolute …

door
Expand vulnerability and risk management programs to eliminate security misconfigurations

In this podcast recorded at RSA Conference 2018, Tim White, Director of Product Management, Policy Compliance at Qualys, discusses how expanding vulnerability and risk …

magnifying glass
Visual network and file forensics with Rudra

In this podcast recorded at Black Hat USA 2017, Ankur Tyagi, senior malware research engineer at Qualys, talks about visual network and file forensics. Here’s a …

Don't miss

Cybersecurity news