Remove InfoSec Remove Network Security Remove Webinar
article thumbnail

Webinar: Extended Detection and Response (XDR) – Past, Present and Future

Security Boulevard

Our world is one where IT infrastructure, attacker trends, and workspace norms continue to shift, so it’s an increasingly difficult challenge to build a resilient infosec program backed by tested best practices. The post Webinar: Extended Detection and Response (XDR) – Past, Present and Future appeared first on Security Boulevard.

InfoSec 52
article thumbnail

Herjavec Group Wins 4 Cyber Defense Magazine Global InfoSec Awards

Herjavec Group

Threat Disruption Across Platforms – Network Security Monitoring coupled with Management of best of breed EDR or XDR solutions, cloud environments and containers. . SOAR to Drive Security ROI – Augment your security team with time to value on automated, pre-approved, pre-defined playbooks and resolver group expertise. .

InfoSec 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Targeted Malware Reverse Engineering Workshop follow-up. Part 1

SecureList

On April 8, 2021, we conducted a webinar with Ivan Kwiatkowski and Denis Legezo , Senior Security Researchers from our Global Research & Analysis Team (GReAT), who gave live workshops on practical disassembling, decrypting and deobfuscating authentic malware cases, moderated by GReAT’s own Dan Demeter.

article thumbnail

Water utility CISO offers tips to stay secure as IT and OT converge

SC Magazine

From an economics point of view, solutions that can be simultaneously implemented across both IT and OT environments – such as secure-access platforms with two-factor or multi-factor authentication – is a good place for a utility to start, she added, speaking in an online webinar organized by Cisco Systems.

CISO 82
article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

We constantly see new threats, and threat vectors, come and go; which puts a tremendous strain on the InfoSec teams that have to protect organizations and businesses from these threats. At the same time companies saw security resources in their organizations dwindle, leaving defenders to cope up with the onslaught of attacks.