<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>AlgoSec</title>
        <link>https://video.algosec.com</link>
        <description>AlgoSec simplifies and automates network security policy management across on-prem firewalls and cloud security controls. </description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <image>
            <url>https://video.algosec.com/files/rv1.24/siteicon.png</url>
            <title>AlgoSec</title>
            <link>https://video.algosec.com</link>
        </image>
        <atom:link rel="self" href="https://video.algosec.com/rss/tag/cyber threats"/>
        <atom:link rel="next" href="https://video.algosec.com/rss/tag/cyber threats?tag=cyber+threats&amp;p=2&amp;podcast%5fp=f&amp;https="/>
        <item>
            <enclosure url="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/video_medium/master-the-zero-trust-strategy-for-video.mp4?source=podcast" type="video/mp4" length="79096815"/>
            <title>Master the Zero Trust Strategy for Improved Cybersecurity</title>
            <link>http://video.algosec.com/master-the-zero-trust-strategy-for</link>
            <description>&lt;p&gt;In today's digital world, cyber threats are becoming more complex and sophisticated. Businesses must adopt a proactive approach to cybersecurity to protect their sensitive data and systems. This is where zero trust security comes in - a security model that requires every user, device, and application to be verified before granting access.
&lt;p&gt;If you're looking to implement zero trust security in your business or want to know more about how it works, join our upcoming webinar. AlgoSec co-Founder and CTO Avishai Wool will discuss the benefits of zero trust security and provide you with practical tips on how to implement this security model in your organization.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/master-the-zero-trust-strategy-for"&gt;&lt;img src="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/84210327</guid>
            <pubDate>Wed, 08 Mar 2023 17:01:07 GMT</pubDate>
            <media:title>Master the Zero Trust Strategy for Improved Cybersecurity</media:title>
            <media:description type="html">&lt;p&gt;In today's digital world, cyber threats are becoming more complex and sophisticated. Businesses must adopt a proactive approach to cybersecurity to protect their sensitive data and systems. This is where zero trust security comes in - a security model that requires every user, device, and application to be verified before granting access.
&lt;p&gt;If you're looking to implement zero trust security in your business or want to know more about how it works, join our upcoming webinar. AlgoSec co-Founder and CTO Avishai Wool will discuss the benefits of zero trust security and provide you with practical tips on how to implement this security model in your organization.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/master-the-zero-trust-strategy-for"&gt;&lt;img src="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f244c9bfea16f9a9b492ce8a5122a148&amp;source=podcast&amp;photo%5fid=84210327" width="625" height="352" type="text/html" medium="video" duration="1180" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <category>cyberattack</category>
            <category>cyber threats</category>
            <category>micro-segmentatio</category>
            <category>micro-segmentation</category>
            <category>network managemen</category>
            <category>network management</category>
            <category>network securit</category>
            <category>network security</category>
            <category>ransomware</category>
            <category>risk management</category>
            <category>security</category>
            <category>security management</category>
            <category>security policy</category>
            <category>security policy management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/video_medium/zero-trust-framework-for-network-video.mp4?source=podcast" type="video/mp4" length="108886012"/>
            <title>Zero Trust Framework for Network Security</title>
            <link>http://video.algosec.com/zero-trust-framework-for-network</link>
            <description>&lt;p&gt;With the increasing number of cyber threats, securing your network has become a top priority. Zero Trust Architecture is a new approach to cybersecurity that has proven to be effective in protecting against these threats. By incorporating Zero Trust principles into your security infrastructure, you can rest assured that your sensitive data is protected.&lt;/p&gt;
&lt;p&gt;In this informative video, Prof. Avishai Wool, CTO and Co-Founder of AlgoSec, discusses the key principles of Zero Trust and provides practical tips on how to integrate it into your existing security infrastructure.&lt;/p&gt;
&lt;p&gt;Don't miss this opportunity to take your security to the next level! Watch this video now and start implementing the best practices for Zero Trust Architecture.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/zero-trust-framework-for-network"&gt;&lt;img src="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/83004257</guid>
            <pubDate>Thu, 02 Feb 2023 10:11:27 GMT</pubDate>
            <media:title>Zero Trust Framework for Network Security</media:title>
            <media:description type="html">&lt;p&gt;With the increasing number of cyber threats, securing your network has become a top priority. Zero Trust Architecture is a new approach to cybersecurity that has proven to be effective in protecting against these threats. By incorporating Zero Trust principles into your security infrastructure, you can rest assured that your sensitive data is protected.&lt;/p&gt;
&lt;p&gt;In this informative video, Prof. Avishai Wool, CTO and Co-Founder of AlgoSec, discusses the key principles of Zero Trust and provides practical tips on how to integrate it into your existing security infrastructure.&lt;/p&gt;
&lt;p&gt;Don't miss this opportunity to take your security to the next level! Watch this video now and start implementing the best practices for Zero Trust Architecture.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/zero-trust-framework-for-network"&gt;&lt;img src="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=bfa44d66208c73afcdb215c88f01464d&amp;source=podcast&amp;photo%5fid=83004257" width="625" height="391" type="text/html" medium="video" duration="2681" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/standard/download-8-thumbnail.jpg" width="75" height=""/>
            <category>cyberattack</category>
            <category>cyber threats</category>
            <category>micro segmentation</category>
            <category>micro-segmentation</category>
            <category>network management</category>
            <category>network security</category>
            <category>ransomware</category>
            <category>risk management</category>
            <category>security</category>
            <category>security management</category>
            <category>security policy</category>
            <category>security policy management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/video_medium/taming-the-storm-clouds-managing-video.mp4?source=podcast" type="video/mp4" length="87142532"/>
            <title>Taming the storm clouds: managing network security across hybrid and multi-cloud</title>
            <link>http://video.algosec.com/taming-the-storm-clouds-managing</link>
            <description>&lt;p&gt;Yonatan Klein, Director of Product Management | Mar 27, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.&lt;/p&gt;
&lt;p&gt;Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.&lt;/p&gt;
&lt;p&gt;Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.&lt;/p&gt;
&lt;p&gt;Yonatan will cover how to:&lt;br&gt;
•Easily and automatically identify security risks and misconfigurations in your cloud&lt;br&gt;
•Centrally manage security controls across accounts, regions and VPCs/VNETs&lt;br&gt;
•Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs&lt;br&gt;
•Obtain a cross-network-estate risk analysis&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/taming-the-storm-clouds-managing"&gt;&lt;img src="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49895193</guid>
            <pubDate>Thu, 28 Mar 2019 13:04:00 GMT</pubDate>
            <media:title>Taming the storm clouds: managing network security across hybrid and multi-cloud</media:title>
            <media:description type="html">&lt;p&gt;Yonatan Klein, Director of Product Management | Mar 27, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.&lt;/p&gt;
&lt;p&gt;Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.&lt;/p&gt;
&lt;p&gt;Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.&lt;/p&gt;
&lt;p&gt;Yonatan will cover how to:&lt;br&gt;
•Easily and automatically identify security risks and misconfigurations in your cloud&lt;br&gt;
•Centrally manage security controls across accounts, regions and VPCs/VNETs&lt;br&gt;
•Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs&lt;br&gt;
•Obtain a cross-network-estate risk analysis&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/taming-the-storm-clouds-managing"&gt;&lt;img src="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dc4df391a76a089c566104a63f8badf5&amp;source=podcast&amp;photo%5fid=49895193" width="625" height="352" type="text/html" medium="video" duration="2733" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Cloud Security</category>
            <category>Cyber Security</category>
            <category>cyber threat</category>
            <category>Cyber Threats</category>
            <category>DevOps</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>IT Security</category>
            <category>Network Security</category>
            <category>Risk Management</category>
            <category>SDN</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/video_medium/the-algosec-qradar-app-for-incident-video.mp4?source=podcast" type="video/mp4" length="13528027"/>
            <title>The AlgoSec QRadar App for Incident Response</title>
            <link>http://video.algosec.com/the-algosec-qradar-app-for-incident</link>
            <description>&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with the IBM QRadar Security Intelligence Platform.&lt;/p&gt;
&lt;p&gt;Through AlgoSec’s integration with IBM QRadar, this App enhances and automates the Security Incident Response process by:&lt;/p&gt;
&lt;p&gt;* Augmenting security incident data with business context&lt;br /&gt;
* Automatically associating applications with compromised servers&lt;br /&gt;
* Identifying network connectivity to/from a compromised server&lt;br /&gt;
* Automatically isolating a compromised server from the network&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-algosec-qradar-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182027</guid>
            <pubDate>Fri, 03 Mar 2017 02:00:00 GMT</pubDate>
            <media:title>The AlgoSec QRadar App for Incident Response</media:title>
            <media:description type="html">&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with the IBM QRadar Security Intelligence Platform.&lt;/p&gt;
&lt;p&gt;Through AlgoSec’s integration with IBM QRadar, this App enhances and automates the Security Incident Response process by:&lt;/p&gt;
&lt;p&gt;* Augmenting security incident data with business context&lt;br /&gt;
* Automatically associating applications with compromised servers&lt;br /&gt;
* Identifying network connectivity to/from a compromised server&lt;br /&gt;
* Automatically isolating a compromised server from the network&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-algosec-qradar-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=697b47e70fcfbb1d2c48e4c514506a03&amp;source=podcast&amp;photo%5fid=44182027" width="625" height="352" type="text/html" medium="video" duration="388" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cyber attacks</category>
            <category>cyber threats</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>IBM QRadar</category>
            <category>incident response</category>
            <category>network security</category>
            <category>security intelligence</category>
            <category>security intelligence platform</category>
            <category>Security Policy</category>
        </item>
    </channel>
</rss>
