Webinar – Behavior Based Authentication to Protect IT Assets

Webinar – Behavior Based Authentication to Protect IT Assets

Securing IT infrastructure is a critical task that comes with multiple challenges. This task becomes even harder due to the ever-expanding landscape of threats. In our webinar, we highlighted these challenges and threats, and identified important problems with the status quo in IT Security. We then discussed how an Active Authentication approach can rise to the challenge and deliver an end-to-end solution that addresses these problems. Did you miss our Webinar? You can catch up everything in here. (more…)

Tur-Duck-En Security for IT and DevOps

Tur-Duck-En Security for IT and DevOps

Thanksgiving is a popular US tradition. Being an immigrant to this great country it has always been something I have looked forward to. I am excited to have my family and friends around the table, enjoy good food, catch up, laugh and have a great time. I got thinking this year about Tur-duck-en. Why am I talking about Tur-duck-en when it comes to enterprise security? The reason is that as of now enterprise security in most companies is like a [...]

Session Recording - Header Image

Did John run rm –rf*? Why enterprises use session recording

For those of us who have been in Enterprise IT teams and DevOps groups it is a fact of life to be called in to investigate an incident. The incident in question can range from – we think we have been hacked to we are being sued we need to get data to prove our case. I am going to talk about the centre of this wide spectrum – employee activity validation. What is the problem? Your business runs on certain [...]