Back to Search Begin New Search Save Search Auto-Notify
Bugcrowd Webinar - Crowdsourced Securit...
With new attack vectors comes an increase in the number of ways that known and unknown vulnerabilities can be exploited. To level the playing field, organizations are turning to crowdsourced security.The Crowd -- the community of hackers, researchers, and pentesters on Bugcrowd's Crowd control platform -- identifies vulnerabilities that attackers exploit, which in turn protects organizations of all levels. Therefore, it comes as no surprise th...
Add Favorite
Delivering the Power of Collective Cybe...
Since IronNet was founded in 2014 by General Keith Alexander, the mission has been to deliver the power of collective cybersecurity to defend companies, sectors, and nations so that we all can live and work with peace of mind in cyberspace. Today, organizations around the world turn to IronNet to detect known and unknown cyber threat targets in their networks and share that information with peers so that all members can collectively defend aga...
Add Favorite
Secure Your Move to Cloud with Zero Tru...
The promise of cloud and mobility is to provide access to key services quickly and comprehensively - any user, any location, any time, any device. Security teams are embracing technologies that ensure productivity while retaining visibility and control, as applications migrate from datacenter to cloud and users are increasingly outside any security perimeter.To clarify this complex topic, NIST has published Draft Special Publication 800-207, d...
Add Favorite
Get Ahead of Ransomware with Splunk & AWS
From medical record systems to public transportation infrastructure, the onslaught of recent ransomware attacks has upended organizations around the world. Although a security issue, the fast propagation and business-impacting nature of these attacks show that ransomware is a greater concern that affects all of IT.How can you better prepare and respond to such threats?Join us and learn how to apply a broader analytical approach and data-driven...
Add Favorite
Protect against Ransomware
This webinar will explore how Dell EMC and RSA can successfully help secure your infrastructure, increase your platform efficiency, and simplify your management processes. Join us for an on demand webcast to learn more about how to secure your workspace with data protection and threat detection. During this webinar, you can expect to learn about: How Dell EMC's Cyber Recovery solution can help protect data, identify suspicious activity, and pe...
Add Favorite
Detecting Federal Insider Threats: A Ne...
Detecting insider threats in not just about protecting data. What if suspicious activity starts before data is accessed? What if data is not the target? Detecting modern insider threats requires a new approach tailored for Federal agencies. On January 16th, join Michael Davis, Chief Technology Officer of GoSecure and author of "Hacking Exposed", to learn how Federal agencies have a new tool in their arsenal to detect, and respond, the latest i...
Add Favorite
Adopt a People-Centric Approach to Security
Security leaders at government agencies have a complex workforce to protect. Today, agency employees, contractors, partners, and even citizens all need access to applications and resources from a variety of different locations, including at work, at home, or from a local coffee shop. The rise of cloud and mobile devices has catalyzed rethinking modern security, but amidst this complexity, one consistency remains: credential-harvesting is the m...
Add Favorite
Next Level Security with Infoblox
Security teams know painfully well that it takes too long from the time a breach happens to being able to identify what happened and how. Rather than investing in another security tool, what you need is a smarter and more efficient way to manage and secure your entire network. The Infoblox security solution is a platform designed from the ground up to protect enterprise networks, users and devices from becoming victims of today's sophisticated...
Add Favorite
Security Transformed with Zero Trust
High-profile breaches involving "trusted" insiders showcases the fact that trust is something malicious actors can exploit to their advantage. John Kindervag, Palo Alto Networks Field CTO, created Zero Trust on the principle of "never trust, always verify," to help organizations effectively segment their networks and relieve any doubts of insider attacks. In recent years, Zero Trust has evolved to become a strategic Cybersecurity initiative th...
Add Favorite
PeopleSoft Best Practices: Secure Acces...
As the core of your organization, sensitive data inside PeopleSoft has become a top target for malicious threats. Both internally and externally. With native PeopleSoft security and compliance features trying to keep up with modern threats, organizations must evaluate strategies to strengthen authentication and gain deeper visibility into user activity. Join Appsian and Carahsoft, during their webinar, as PeopleSoft experts at Appsian discuss:...
Add Favorite
Back to Search Begin New Search