This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Columbia’s panel of security experts and Columbia University Technology Management faculty will include Cristina Dolan Christy Fernandez-Cull Joseph Steinberg …and will be moderated by Program Director, Alexis Wichowski. The webinar is open to the public and is FREE to attend — but, you must register in advance.
Join Bonnie Stith, former Director of the CIA’s Center for Cyber Intelligence , and and Joseph Steinberg, renowned cybersecurity expert witness and columnist , for a special, free educational webinar, Best Practices for Asset Risk Management in Hospitals. The discussion will cover: * How IT asset risks have evolved.
Embark on a journey of thought leadership into the dynamic realm of cybersecurity, and be part of the conversation and collective effort to shape the future of the industry, by joining the inaugural webinar of Coro’s new series, Cybersphere. Best of all – this webinar is FREE thanks to the sponsorship of Coro.
In recent weeks, I did two fun webinars related to Security Operations, and there was a lot of fun Q&A. For extra fun, I had ChatGPT answer some of them, to see if it can replace me :-) So, first, ISACA webinar “Modernize Your SOC for the Future” focused on our Autonomic Security Operations vision. with the SOC?
Today’s technology leaders play a more strategic role in establishing cybersecurity strategy for their organizations. Software is complex, which makes threats to the software supply chain more real every day. In the U.S. alone, cyber losses totaled $10.3 billion in 2022.
I recently did this fun SANS webinar titled “Anton Chuvakin Discusses “20 Years of SIEM?—?What’s What’s Next?”” (the seemingly self-centered title was suggested by CardinalOps who organized the webinar). As it is common for SANS webinars , we got a lot of great questions that I feel like re-answering here for posterity.
In 2023, the cloud isn't just a technology—it's a battleground. In collaboration with the esteemed experts from Lacework Labs, The Hacker News proudly presents an exclusive webinar: 'Navigating the Cloud Attack Landscape: 2023 Trends, Techniques, and Tactics.'
SecureWorld recently presented the webinar Cyber Risk: Stay Ahead of Evolving Threats With Proactive Collaboration with speakers representing Reciprocity, a leader in Governance, Risk, and Compliance Software (GRC). If you missed the livestream of the webinar, it is now available on demand.
On March 28, 2024, Malwarebytes CEO, Marcin Kleczynski, and Payette Associates Director of Information Technology, Dan Gallivan, will answer these questions and more in our live Byte into Security webinar. Why attend?
Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP
As a result, data protection needs to be a concern for most banks, businesses, and information technology specialists. This is an exclusive webinar you won’t want to miss! million attacks, the threat marked a 148% increase compared to 2020 and was the most expensive year on record! Ransomware protection planning best practices.
Discover the intersection of Ransomware-as-a-Service (RaaS) gangs and Living Off The Land (LOTL) attacks in our latest webinar, now available on-demand, led by cybersecurity experts Ian Thomas, Mark Stockley, and Bill Cozens. Enhance your ransomware knowledge and preparedness by watching this essential webinar on-demand.
In our latest webinar, we explored real-world cybersecurity and online safety incidents, focusing on strategies that K-12 techs can use to prepare for hidden digital threats.
Did you miss our recent webinar on EDR vs. MDR? In this blog post, we'll be recapping the highlights and key takeaways from the webinar hosted by Marcin Kleczynski, CEO and co-founder of Malwarebytes, and featuring guest speaker Joseph Blankenship, Vice President and research director at Forrester. Don't worry, we've got you covered!
Experts in K-12 edtech and data protection share their expertise and advice in this panel discussion recap We recently had the great fortune to host two experts in K-12 education technology and data protection during a live webinar panel discussion focused on student data privacy and security.
Lock Out Hackers: Why Every School Needs Strong Passwords We recently hosted a live webinar to help kick off 2025, encouraging you to strengthen your school districts cybersecurity and online safety systems.
In our latest webinar, we explored real-world cybersecurity and online safety incidents, focusing on strategies that K-12 technology staff can use to prepare for hidden digital threats.
The increasing volume and sophistication of cyberattacks have naturally led many companies to invest in additional cybersecurity technologies. An upcoming webinar by cybersecurity company We know that expanded threat detection capabilities are necessary for protection, but they have also led to several unintended consequences.
Next week, Senior Analyst Dave Gruber of ESG will join cybersecurity company Cynet for a webinar to help companies better understand the promise and realities of emerging XDR technologies.
These technologies scale on demand, handling millions of daily file transfers – it's almost impossible to imagine a world without them. Modern web app development relies on cloud infrastructure and containerization.
Don't miss our upcoming webinar on EDR vs. MDR! How MDR providers work with clients to understand their security technology stack, make recommendations, and agree on response actions to take. If EDR or MDR is better for your business based on the resources you have available and the level of security you require.
National Institute of Standards and Technology (NIST) and certified by accredited labs. Justin Brookman, Director of Technology Policy at Consumer Reports , remarked: "The mark will inform consumers whether or not a company plans to stand behind the product with software updates and for how long.
A few days ago we did a very well-attended webinar focused on the modern Security Operations Center (SOC) approach (see “Trend for the Modern SOC” for a replay link). A: If by SOC-as-a-service, you mean using an MSSP or an MDR provider, then some of the recommendations from the webinar do apply as well. Q: What makes a good SOC?
The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.
The continuous evolution of technology introduces new and increasingly sophisticated threats daily, posing challenges to organizations all over the world and across the broader spectrum of industries striving to maintain
You’re invited to watch the on-demand webinar ‘Securing your cloud environment with endpoint and network detection and response (EDR/NDR) technologies’ – [link]. Available technologies to secure your assets and enterprise environments. + How to implement EDR/NDR security in your cloud environment.
Cunningham, Chief Technology Officer Michael Wilson, and Product Manager Marcy Elder—gathered for a webinar to share their insights on what’s next for cybersecurity management. Read More The post A Fresh Approach to Cybersecurity: Unifying Intelligence, Technology and Human Expertise appeared first on Nuspire.
To help smooth the transition to a secure start to the 2024-2025 school year, we recently hosted a webinar featuring Samuel Hoch, Technology Director at Catoosa Public Schools, and Robert Batson, Technology Director at Tahlequah Public Schools.
This blog and webinar cover thetopic. #4 4 Untested Tooling and Technology Under Stress: The SOC relies on tools and technologies that have not been rigorously tested under high-stress scenarios or against real-world attack simulations. This reveals weaknesses when the pressure is on.
Putting in place the right people, technological tools and services, MSSPs are in a great position to ensure their customers' cyber resilience. In today's fast-paced and ever-changing digital landscape, businesses of all sizes face a myriad of cybersecurity threats.
With novel technologies like DevOps, robotic process automation, hybrid and multi-cloud frameworks introduced into the IT infrastructure, the number of privileged access …. The post Evolution of privileged access management: Serving modern enterprises’ expanding use cases [Expert-led webinar] appeared first on ManageEngine Blog.
In today's rapidly evolving technological landscape, the integration of Artificial Intelligence (AI) and Large Language Models (LLMs) has become ubiquitous across various industries.
But those with complex, hybrid environments or with large volumes of data and legacy technology stacks find it difficult to focus more of their time on enabling Azure Sentinel’s advanced capabilities, to provide more proactive, measurable. The post Webinar Optimizing Your Azure Sentinel Platform appeared first on TechRepublic.
As technology continues to evolve, so too do the threats that target both individuals and organizations. Activities during this week include engaging workshops, informative webinars, and community events, all designed to empower individuals with the knowledge and skills necessary to navigate today’s cyber threats effectively.
With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize. An integration with Cigent Technology is now available for Secure Endpoint customers to integrate with. Kenna has a healthy 3rd Party ecosystem of technology partners.
The webinar will feature Senior Vice President Lynn McLean and Principal Security Architect Alan Yarusevich as they introduce threat prevention from Cyemptive Technologies. The webinar is free of charge. About Cyemptive Technologies. More information about Cyemptive Technologies is available at www.cyemptive.com.
Extended detection and response (XDR) is expected to be the future of cybersecurity, merging security technologies with the evolving approach to the way we do cybersecurity.
The explosion of artificial intelligence tools has led to massive adoption of AI for technology and business tasks, enabling unprecedented productivity gains – but also introducing emerging risks for privacy and cybersecurity that are still little understood.
Join the live webinar “ How to Build Your Cyber Resume for Top Cyber Jobs in 2023 ” on Thursday January 12, 2023 @ 12:00p ET – presented by SCIPP International, in partnership with Old Dominion University. Mr. Chubbuck has over 25 years of Information Security and Technology experience.
Dragos, a leader in cybersecurity for industrial control systems, has launched a new portal designed to help industrial asset owners build operational technology (OT) cybersecurity programs, improve their security postures, and reduce OT risk.
In recent webinar Preventing Helpdesk Phishing with Duo and Traceless , Duo PMM Katherine Yang sat down with Gene Reich, Co-founder of Traceless to discuss why stronger identity verification is critical for MSPs and helpdesk teamsespecially with the increased accessibility of AI technologies driving identity fraud.
Update: The FDA has announced a webinar on the Final Guidance.] The city of Seattle is suing Hyudnai and Kia for not installing certain anti-theft technology which is standard across other car makers. Updated to add FDA webinar. CISA has released their open source strategy. Story at Vice , complaint.) In person only).
Static analysis is a technology that can help locate these types of errors early in the development cycle, thereby saving time and money.?? In this webinar Solid Sands and GrammaTech will cover these particular fault vectors and help you cover off these areas, which are often blind spots for software development teams. . .
In this webinar replay, Omdia outlines the ways in which XDR facilitates faster and easier threat detection and response, and key points organizations should consider when evaluating XDR technology.
The Advanced Technology Academic Research Center (ATARC) recently hosted the webinar "Unlocking Cyber Readiness with SBOMs," focusing on the essential role of software bills of materials (SBOMs) in enhancing cybersecurity frameworks across various government agencies and private-sector organizations.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content