Back to Search Begin New Search Save Search Auto-Notify
Crimeware via Email: Recent Trends and...
Destructive and criminal malware attacks are continually finding new ways to evade security defenses. ReversingLabs has thorough experience in analyzing these threats. Join our webinar and discover recent malware threats, how they remain undetected, and how you can strengthen your security environment with increased confidence in your detection. We will show you how you can reduce the time to identify and respond when trouble hits. During this...
Add Favorite
Get Ahead of Ransomware with Splunk & AWS
From medical record systems to public transportation infrastructure, the onslaught of recent ransomware attacks has upended organizations around the world. Although a security issue, the fast propagation and business-impacting nature of these attacks shows that ransomware is a greater concern that affects all of IT.How can you better prepare and respond to such threats?Join us and learn how to apply broader analytical approach and data-driven...
Add Favorite
Splunk Webinar Series: To the Basics an...
Curious about how Splunk can help your organization? Join us for this informative on demand webcast series where we will discuss a variety of topics ranging from Splunk 101, machine data, IT operations, security, and more. This series will provide a wide overview of how you can leverage your machine data, gain real-time insights, and make smarter business decisions within your agency. There's An App for That: Splunk Security Essentials Your or...
Add Favorite
MetaAccess: Next Generation Network Acc...
Agencies are increasingly challenged by the proliferation of risky, unmanaged devices in the age of bring-your-own-device in the workplace. Fortunately, there is a surprisingly simple way to tame all those potentially rogue devices with industry-leading endpoint security and advanced threat prevention technologies. OPSWAT MetaAccess empowers organizations to enforce internal security standards, meet security, and regulate compliance across all...
Add Favorite
Enhance Your Security Posture with Info...
Cybercrime is growing in complexity and scale, but security teams cannot respond to incidents fast enough. Improved response times requires multiple stakeholders, better information and processes. Throwing more people at the problem is not possible, nor the correct solution. Implementing and integrating security tools that allow you to simplify, do more with less and build adaptive security architectures to protect your critical infrastructure...
Add Favorite
Get Ahead of Ransomware with Splunk & AWS
From medical record systems to public transportation infrastructure, the onslaught of recent ransomware attacks has upended organizations around the world. Although a security issue, the fast propagation and business-impacting nature of these attacks shows that ransomware is a greater concern that affects all of IT.How can you better prepare and respond to such threats?Join us and learn how to apply broader analytical approach and data-driven...
Add Favorite
Root Process Protection through Encrypt...
You are invited to our live webinar with Thales on November 19th where we will take a data-centric security approach to the discussion beginning with the application stack and highlight where and why industry best practices for encryption, policy, and access controls can be applied. Join us to learn about Thales' Root Process Protection through Encryption within Docker-Kubernetes. We'll cover protecting structured and unstructured data at rest...
Add Favorite
Addressing Malware: A Layered Security...
What do the City of Albany, City of Atlanta, City of Baltimore, Cleveland Hopkins International Airport, North Carolina's Onslow Water and Sewer Authority, and The United States Department of Homeland Security have in common?Ransomware.We've all heard of ransomware before, but how do we understand the associated risks and prevent it, given limited resources? If your organization believes it could be better protected against ransomware, join Ca...
Add Favorite
Advancing the Maturity of Your Organiza...
As recent as five years ago, putting up strong network controls and ensuring a defense-in-depth posture was enough to keep the bad actors out of a network and minimize the risk of a cyber-attack. However, times have changed and the delineation of organizational perimeters has blurred between on-premise and cloud-based resources. This is especially true due to the increase in users needing to access resources and accounts remotely. Identity is...
Add Favorite
Bugcrowd Webinar - Crowdsourced Securit...
With new attack vectors comes an increase in the number of ways that known and unknown vulnerabilities can be exploited. To level the playing field, organizations are turning to crowdsourced security.The Crowd -- the community of hackers, researchers, and pentesters on Bugcrowd's Crowd control platform -- identifies vulnerabilities that attackers exploit, which in turn protects organizations of all levels. Therefore, it comes as no surprise th...
Add Favorite
Back to Search Begin New Search