Claranet | Videos
The latest videos from Claranet.
Video | Why you need a Microsoft 365 Security Health Check
Is your business secure in Microsoft 365? Get involved in our Microsoft 365 Security Health Check to make sure you are configured to industry best practice.
Microsoft Sentinel: what, why, and how it works with your business
With an estimated 85%* of organisations expected to embrace a cloud-first principle by 2025, and with new cloud-based vulnerabilities being discovered constantly, securing your cloud environment is no
Exploitation at speed: beating bad actors to find vulnerabilities in your systems
New vulnerabilities are being found constantly. A 12-month penetration test will find these once a year, but it is possible to identify and fix these bugs immediately with continuous monitoring.
- Go there now
Endpoint Detection and Response
Endpoint Detection and Response helps you protect what matters by fortifying every edge of your network with real-time autonomous protection.
DevSecOps: What, Why and How
This webinar discusses how to address security issues by automating security in a DevOps environment to obtain a better level of assurance.
Why Train With Claranet Cyber Security
Thinking about coming on a course? Here we will explain exactly what is involved, why it might be of value to you, how it works in practice, what you need and most importantly, what you get out of it.
Through an Attackers Eyes: Your Infrastructure
Join Anthony from NotSoSecure, on our Advanced Infrastructure Hacking webinar. With diverse modern infrastructure making waves, our organizational footprint is everywhere, from private internal netw
Through an Attackers Eyes Your Web Applications
This webinar covers current hacking techniques used to compromise web applications, API's and associated end-points, as well as Advanced vulnerability identification and exploitation techniques.
Webinar | Beating bad actors to find vulnerabilities in your systems
Rob Jepson, Research and Innovation Lead at Claranet, unveils our brand new webinar surrounding finding vulnerabilities in your systems.
Key threats to sensitive data in the cloud
Anthony explores cloud storage specific security considerations, examining real-world examples of how common misconfigurations can lead to vulnerabilities being exploited by unethical hackers.
From point in time to continuous testing: how application security is changing
In the past, cybersecurity threats were slow to emerge and relatively easy to contain. But then the world changed. Business applications multiplied and the pace of development increased. In today’s w
Continuous Security Testing: how to move fast and stay secure
Continuous Security Testing is a new approach that enables penetration testing at scale and at much greater frequency. Thinking continuously provides a cost-effective approach to advanced testing and
Join Paul Jack from Sec-1, part of Claranet Cyber Security, to discover how the Endpoint protection market has evolved and which key product capabilities you can implement to protect on-prem/cloud/con
Webinar | Web application security review
Through an Attacker's Eyes Your Web Applications
Application Security for Developers Learning Defence by Offense
DevSecOps What, Why, and How
Cloud: Stealing the Silver Lining
Smishing: A New Take on a Classic Trick
Presenter: Scott Issac, Black Hat Trainer, and accredited Pen Tester. In the session, Scott will explore cloud storage specific security considerations.