This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Join Cybereason CSO Sam Curry for this webinar series where he revisits some of the cybersecurity highlights of the first half of 2021, from the SolarWinds supply chain attacks to DarkSide and other major ransomware operations.
Join Cybereason CEO and co-founder Lior Div and CSO Sam Curry as they break down the anatomy of a ransomware attack. The post Webinar November 18th: Anatomy of a Ransomware Attack appeared first on Security Boulevard. Learn how Cybereason enables defenders to protect themselves and orchestrate the best ransomware defenses.
To help shed some light on what to expect, we recently hosted a webinar featuring Lewie Dunsworth, Nuspire CEO, and J.R. Cunningham, Nuspire CSO, who offered their cybersecurity predictions. With the roller coaster ride that was cybersecurity in 2021, we’re all curious to see what 2022 has in store for our industry.
Source: ISACAs Tech Workplace and Culture 2025 report, March 2025) For more information about recruiting and retaining cybersecurity professionals: 10 Ways to Boost Cybersecurity Talent Retention (InformationWeek) 60% of cybersecurity pros looking to change employers (CSO) The cybersecurity industry has an urgent talent shortage.
Join Ed Amoroso, CEO of TAG Cyber and Sam Curry, CSO of Cybereason as they discuss pre-COVID-19 trends, discontinuities, and the outlook based on recent events and challenges in the security industry. The post Webinar: The Current State and Future Challenges of Security appeared first on Security Boulevard.
This statement was supported by lots of independent research, business press articles, webinars, local events, and even sessions at RSA and Black Hat crowing about the burgeoning relationship between CISOs, business executives, and corporate boards. To read this article in full, please click here (Insider Story)
Heres why and how tech firms are responding (World Economic Forum) Quantum ComputingQuantifying the Current State of the Art to Assess Cybersecurity Threats (MITRE) 3 - A temperature check on cloud security challenges During this weeks webinar How does an industry leader like Tenable protect its own cloud environments?,
“It took nearly 11 months (328 days) to identity and contain data breaches resulting from stolen or compromised credentials.” – IBM’s Cost of Data Breach Report 2023 I recently came across a 2012 article from CSO Online , and realized that it has been more than 11 years since the phrase “Identity is the new perimeter” was coined!
Watch the (ISC)² webinar Protecting the Enterprise: 5 Components needed for Cybersecurity Training to get insights into who needs cybersecurity training and much more. Even if a company employs a Chief Information Security Officer (CISO) or Chief Security Officer (CSO), the position may still report to the CIO.
Cunningham, CSO, hosted a webinar to review the data in detail and explain its implications. Nuspire recently announced findings from its annual research study revealing CISO challenges, priorities and key trends, as well as the drivers behind their purchasing decisions. Read on to get the highlights. The purpose of the.
People will ignore what you say when you’re only speaking technical,” James Stanger, chief technology evangelist at CompTIA, told CSO Online. Here are some ways you can do that: Look for webinars on cybersecurity topics, not just to learn but to learn who the players are so you can contact them later. The best way to do this ?
During a recent NETSCOUT OnGuard webinar, a panel of security researchers from NETSCOUT’s threat intelligence team discussed the vital role threat intelligence plays in a modern cybersecurity strategy. To read this article in full, please click here
The Dragos OT-CERT (Cybersecurity Emergency Readiness Team) portal offers its users access to OT cybersecurity best practices, cybersecurity maturity assessments, training, workshops, tabletop exercises, webinars, and more.
During a recent NETSCOUT OnGuard webinar, a panel of industry experts discussed this rapid digital transformation of enterprise networks and how NetOps and SecOps can join forces for faster, more decisive network issue assessment.
To that end, Microsoft partnered with BlueVoyant and Chubb to host a webinar, “How enabling Microsoft security features can help obtain favorable cyber insurance coverage.” Keep reading for our top takeaways from the event, and click here to watch the full webinar recording. To read this article in full, please click here
on-demand webinar) The Data-Factor: Why Integrating DSPM Is Key to Your CNAPP Strategy (blog) When CNAPP Met DSPM (infographic) VIDEO Integrated DSPM features - enable data protection today!
During a recent NETSCOUT OnGuard webinar, a panel of security researchers from NETSCOUT’s threat intelligence team discussed the vital role threat intelligence plays in a modern cybersecurity strategy. To read this article in full, please click here
Hackers are putting a bullseye on healthcare. Experts explore why hospitals are being singled out and what any company can do to better protect themselves.
Sean Leach of Fastly said his company did a webinar earlier this year that talked about how the cybersecurity department is often called the "department of no," but in reality it is the department of "know." Leach said it's important to put the focus on enabling the business, not focusing on what not to do.
. “The past year fundamentally shifted the way we work, while simultaneously creating new security challenges for customers around the world,” said Chris Niggel, Regional CSO Americas, at Okta. For more information join the Box webinar on June 2, 2021 or visit the Box blog.
gov’t outlines AI strategy, ties it to national security The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content