Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Breach Likelihood: How Secure Are You? Harmeet Kalra: Channels & Alliances Leader, Safe Security || Rahul Neel Mani: Co-founder & Editor, Grey Head Media If we were to believe in data, beware, there were 1,767 publicly reported breaches in the H1, 2021, which exposed a total of 18.8 billion records. Att... 1 year ago | 64 mins Deploying Automation To Decode Breachability Harmeet Kalra: Channels & Alliances Leader, Safe Security In the game of cybersecurity, the defender needs to get it right every time, but the attacker needs to succeed just once. With over 93,000 cyber crime... 2 years ago | 63 mins Leveraging Automation to Reduce Breach Likelihood Harmeet Kalra: Channels & Alliances Leader, Safe Security The Monetary Authority of Singapore recently announced new rules in Singapore after the SolarWinds cyber-attack exposed firms around the world. Cyber-... 2 years ago | 52 mins UnSAFE Bank for Pentesters from Safe Security Rubal Jain: AVP, Enterprise Customer Success, Safe Security Ever wondered how you can test and practice your skills without paying a single penny? Look no more! Developed by Safe Security, let us show you why &... 2 years ago | 22 mins Pitfalls of Cloud Computing | Identifying and Managing Risk Bhavay Arora, Security Analyst || Safe Security By 2021, 98% of organizations plan to adopt multi-cloud infrastructures, but Gartner estimates that 50% of enterprises will unknowingly and mistakenly... 2 years ago | 27 mins Cyber Risk Quantification | Safe Security Saket Modi : Co-founder & CEO, Safe Security || Douglas Hubbard : Owner, Hubbard Decision Research There is a fundamental flaw in how cybersecurity is viewed today. Be it insider threats or third-party risks, compliance failures, or system glitches ... 2 years ago | 63 mins How to secure your Active Directory? Aravind Prakash : Security Analyst, Safe Security In today's new work reality, users and applications are no longer confined to a company's network, challenging security organizations with protection ... 2 years ago | 59 mins Measure and Mitigate Third-party Cyber Security Risks Nakul Khandelwal : Vice President, Product Management, Safe Security As organizations continue to collaborate with vendors in an ever-expanding third-party ecosystem, they also expose themselves to the inherent cybersec... 2 years ago | 39 mins Zero Trust Security | Building NextGen Enterprise Security Gautam K Prabhankar: Sr. Security Analyst, Safe Security In today’s new work reality, users and applications are no longer confined to a company's network, challenging security organizations with protection ... 2 years ago | 41 mins Safeguard Your Multi Cloud Workloads From Potential Breaches | Safe Security Himanshu Chawla : AVP-Product Manager || Safe Security The Cloud misconfiguration has been among the Top 3 frequently used initial attack vectors leading to 15% of the breaches and an average breach cost o... 2 years ago | 55 mins