Back to Search Begin New Search Save Search Auto-Notify
Recovering from a Ransomware Attack wit...
According to the FBI, there is a ransomware attack on the United States Government and its enterprises every 11 seconds. After ransomware enters the system, it encrypts accessible files that are present on the computer and spreads throughout the network. These files have become unusable unless decrypted with a special key owned only by the cybercriminal and released in exchange for payment with an untraceable/pseudonymous method. Kapalya has d...
Add Favorite
Manageable Zero Trust for OT Networks
Check out our on-demand recording of Waterfall Security Solutions and Carahsoft as we discussed how the modern approach to OT cybersecurity initiatives employs both zero-trust architectures and micro-segmentation and how applying these modern concepts to OT networks can be challenging. Attendees of this webinar also learned that OT security programs focus on: Protecting the safety of personnel Reliability of industrial production Physical pre...
Add Favorite
The New Normal for Government Employees
In this on-demand webinar you will learn how your users can access a fast, responsive desktop of their choice anywhere, anytime, from any supported device. Amazon WorkSpaces, a cost-effective, managed Desktop-as-a-Service (DaaS) solution for flexible work styles, can be used to provision either Windows or Linux desktops in just a few minutes and quickly scale to provide thousands of desktops to workers across the globe. During this on-demand w...
Add Favorite
Five Steps to SASE
It's important to understand the difference between private access provided by a platform supporting Zero Trust principles and access delivered through Virtual Private Networks, or VPNs. Although both private access to private resources, the way users are granted access to those resources via iboss Private Access is drastically different. The iboss Private Access service inverts the VPN model completely. Instead of granting a user access to pr...
Add Favorite
Don't Get Hooked: Never Guess on Phishi...
With the recent Executive Order issued on improving the nation's cybersecurity, agencies have made it a top priority to increase their cyber threat and incident response measures. On August 5th, join experts from SAP NS2 and GoSecure as they share insight on GoSecure Inbox Detection and Response (IDR). Designed to layer onto your current email security stack, GoSecure IDR can instantly reduce your risk of successful ransomware, spoofing, busin...
Add Favorite
Eliminating Cost & Complexity of Point...
Most organizations have deployed Microsoft 365, however many are still using point solutions, like Dropbox, for their file sharing and content collaboration. With M365 and e-Share, government organizations can retire these point solutions and securely and easily move their users and external file sharing needs to M365. View this on-demand webinar to discover how e-Share allows the modern collaboration and data protection capabilities of M365 (...
Add Favorite
Cloud Security Strategies: Explore the...
Organisations can be compromised and experience data breaches due to an ineffective cybersecurity strategy. In this session, Tim Rains, Amazon Web Services (AWS) EMEA Regional Leader for Security & Compliance, will inspect popular enterprise cybersecurity strategies and explain why sometimes they fail to protect. Learn how to measure the effectiveness of any cybersecurity strategy, how this should influence your IT roadmap, and how the clo...
Add Favorite
Cloud Security Webinar: Myths and Oppor...
More and more, security is cited as a primary reason organisations around the world are embracing the cloud. Organisations that have moved to the cloud typically claim visibility and control over their data increases, versus what they had on-premises. But others continue to resist moving to the cloud arguing that it’s a security issue. How real are these threats and concerns, and where is the line between fact and myth? Join Tim Rains, t...
Add Favorite
Security & Compliance Basics: Learn the...
Think differently about data security in the cloud – it’s not the same as you’ll find on-premises. This session will walk you through the building blocks of a cloud security model and explain the key security features of Amazon Web Services (AWS). Data protection is the highest priority for any organisation, so we’ll be answering common questions about GDPR, data residency, freedom of information, and privacy. We...
Add Favorite
AWS Security Webinar: The Key to Effect...
It’s essential to protect your private data at all times, especially when you don’t control all the hardware and software components with access to that information. Encryption is a powerful way for organisations to maintain an appropriate level of data confidentiality and integrity. AWS offers many options for using encryption to protect your data in transit and at rest. A variety of features let you determine how much control you...
Add Favorite
Back to Search Begin New Search