This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Join our FREE webinar "Navigating the SMB Threat Landscape: Key Insights from Huntress' ThreatReport," in which Jamie Levy — Director of Adversary Tactics at Huntress, a renowned The truth is that cybercriminals are increasingly targeting smaller businesses, and they're getting smarter every day.
So, we’ve compiled the highest rated, ranked by your peers, (ISC)² cybersecurity webinars from 2021. Our webinars have maintained consistent popularity and have have increased in viewership by more than 70% year-over-year growth this year. ISC)² members can receive CPE credits automatically for viewing webinars.
The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.
Nuspire’s latest threatreport, which analyzes threat data from Q2 2023, reveals a jump in ransomware activity. In fact, the report identified a whopping 65% increase in activity from CL0P, an emerging player among the top ransomware groups.
2020 marks the launch of the Thales Data ThreatReport-Global Edition for the seventh consecutive year. This year the report focuses on the post digital transformation era. The 2020 Thales Data ThreatReport-Global Edition indicates that we have reached a tipping point.
The cyber threat landscape keeps evolving at lightning-speed. According to the latest 2022 BrightCloud® ThreatReport , small to medium-sized businesses (SMBs) are particularly vulnerable to becoming a victim of a ransomware attack. Tune into our latest webinar. Learn More.
Our annual Thales Data ThreatReport-Federal Edition , released today, found that 98% of federal agencies are storing sensitive data within a digitally transformative environment. For more key findings and security best practices, download a copy of the new 2019 Thales Data ThreatReport – Federal Edition.
Below are six take-aways that encapsulate the essence of the discussion: Our 2019 Thales Data ThreatReport- Federal Edition illustrates that the federal government continues to be under attack! For more key findings and security best practices, download a copy of the new 2019 Thales Data ThreatReport — Federal Edition.
Data breaches are at an epidemic level with healthcare organizations experiencing the highest attack rate compared to any other industry studied according to the new Thales 2019 Data ThreatReport-Healthcare Edition. Thales will also host a webinar on Thursday, Sept. 12 at 2:00 p.m. To join, please visit the registration page.
According to the 2019 Thales Data ThreatReport – Retail Edition , nearly two thirds (62%) of U.S. retailers reported experiencing data breaches, with more than a third (37%) occurring in the past year. Unfortunately, this results in retailers as a top target for cyberattacks. trillion (and rising) estimated in retail sales.
Data security professionals also make ambitious plans, but implementation rates are too low – a key finding in the 2019 Thales Data ThreatReport-Financial Services Edition. Here’s a look at four common issues highlighted in the 2019 Thales Data ThreatReport-Financial Services Edition and tips for overcoming them.
This year’s Thales Data ThreatReport-Healthcare Edition shows that cloud usage in the U.S. For more key findings and security best practices, download a copy of the new 2019 Thales Data ThreatReport – Healthcare Edition. Thales will also host a webinar on Thursday, Sept. 12 at 2:00 p.m.
As per the Thales 2024 Data ThreatReport , enterprises reported they were using, on average, 84 SaaS apps in their operations. In today’s world of distributed work, hybrid work and virtual collaboration remain the norm, and businesses depend on Zoom to facilitate meetings, webinars, and team interactions.
Single Pane of Glass, Single Vendor According to the Thales 2023 Data ThreatReport , 93% of organizations use four or more key management solutions (includes enterprise key manager vendors and cloud provider key managers). Join our Webinar Tune in for a webinar with a short demo on August 24 at 10 am Central.
As per the Thales 2024 Data ThreatReport , enterprises reported they were using, on average, 84 SaaS apps in their operations. In today’s world of distributed work, hybrid work and virtual collaboration remain the norm, and businesses depend on Zoom to facilitate meetings, webinars, and team interactions.
The 2023 Thales Data ThreatReport found that 62% of organizations now have at least 5 key management systems as a result of cloud implementations, making it extremely complex to update to PQC.
Thats according to Corvus Insurances Q3 2024 Cyber ThreatReport , which said many of the ransomware attacks in Q3 leveraged outdated VPN software and poorly protected VPN gateways.
In fact, our 2020 ThreatReport found that impersonators are now imitating legitimate business websites to release malicious payloads or steal data, and a shocking 27% of phishing sites use HTTPS to trick the user into clicking phishing links, which makes these attacks even more dangerous.
But is something missing from these industry reports, webinars, and white papers? Researchers analyze industry cybersecurity threatreporting. Researchers from the University of Toronto and the Center for Security Studies in Zurich analyzed hundreds of reports published by the cybersecurity industry.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content