Videos

News, analysis and product demos

Nucleus Security's vulnerability management platform

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Nucleus Security’s COO Scott Kuffer shows Patrick Gray their vulnerability management platform. It ingests scan outputs from a number of vulnerability identification tools, normalises that information and then allows vulnerability management teams to do things like assign responsibility for certain types of bugs to the correct people.

Red Canary Managed Detection and Response

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Sergio Gonzalez tells host Patrick Gray about the Red Canary managed detection and response service.

00:42 The pitch 03:10 Ingested data types 05:10 Red Canary Platform 07:10 Customer set 07:56 Reducing false positives, maximising SNR 08:37 Reports to customers 09:00 Detections are typically rare 10:37 The console 12:02 Mitre ATTACK view 13:14 Steps after detection & improving security 15:09 Response I: manual 16:19 Response II: automation 19:35 Supported endpoint solutions EPP & EDR 20:36 Cloud service telemetry 24:50 Wrap up

Airlock Digital Demo

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

David Cottingham, CEO of Airlock Digital, shows Patrick how Airlock’s execution control and allowlisting solution works.

Managing endpoints with Devicie

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Devicie CEO Martin McGregor shows Patrick Gray how Devicie does so many useful things with devices.

Product Demo: Proofpoint Nexus People Explorer

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Ryan Kalember shows host Patrick Gray how to use Proofpoint’s Nexus People Explorer to understand “people risk,” such as who are the most attacked people and who are the most vulnerable.

Auth0 co-founder and CEO Eugenio Pace walks us through the Auth0 platform

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Eugenio Pace explains to Risky Business host Patrick Gray how the Auth0 platform integrates modern authentication into an application.

00:39 Auth0 description 01:04 Demo application 02:26 Adding authentication 05:45 Integration & code snippets 09:15 Customisation and branding 10:35 Custom domains 11:57 Password strength 13:20 Personal data checks 15:05 Advanced Protections 15:18 Brute force protection 18:16 Bot detection 19:37 Breached password detection 21:45 Consumer third party logins 23:57 Corporate third party logins 26:46 Custom domains 28:02 MFA 36:59 Security Monitoring 38:39 Conclusion