Back to Search Begin New Search Save Search Auto-Notify
Introduction to Peach Fuzzer and Fuzzin...
An on-demand webinar that introduces Peach Fuzzer and overviews our fuzzing technology. Peach Fuzzer is an automated security testing platform that finds unknown vulnerabilities in software & hardware systems, IoT & embedded devices. We help identify unknown vulnerabilities so you can close them and help prevent zero-day attacks.
Add Favorite
Creating a Cybersecurity Professional D...
Cybersecurity is a diverse and technically complex profession. Security monitoring, intrusion detection, project management, education, and awareness are just a few skills vital to the modern cybersecurity team. Leaders are struggling to recruit and retain professionals with these critical skills in a market with dramatically increasing demand for talent. This poses a real threat to the continued operation of cybersecurity teams that require c...
Add Favorite
Top 5 Security Challenges in Cloud Migration
Security tools are often incompatible or simply not optimized for the cloud or deployment processes. This means that security ends up causing high overhead due to multiple environments requiring unique tools, thus hindering your ability to streamline operations. Security tools may work well in one cloud environment but are too inflexible for the needs of a hybrid cloud. Agencies need adaptable security tools that fit anywhere they build, from...
Add Favorite
Dcode Virtual: Improving Cyber Posture...
The coronavirus outbreak emphasizes the need to bring the best emerging tech solutions into the government as adversaries have already shown that they are using this vulnerable time to attack the U.S. government. Join Dcode’s cyber expert Lauren Strayhorn to discuss these challenges and some of the best solutions to keep infrastructure secure, even while teleworking.
Add Favorite
Official (ISC)2 CISSP OnDemand | Certif...
The Official (ISC)² CISSP OnDemand is a self-paced learning solution that covers the 6 domains of the CISSP Common Body of Knowledge (CBK) in order to study for the CCSP examination. Delivered in a modular format, including 28.5 hours of HD video content accessible via any web-enabled device at any time- as often as you want. This CISSP OnDemand allows students to learn at their own pace, spend extra time on material where needed and rei...
Add Favorite
Improve Your Compliance Posture with Id...
Many modern hybrid enterprises and government agencies are struggling to ensure they have security controls everywhere necessary as well as being able to prove their effectiveness, especially with so many shared privileged accounts. Ever-changing industry as well as government regulations make it difficult to get and stay compliant. In order to reassure customers and the public that confidential data such as credit cards and health records are...
Add Favorite
Hitting the Ground Running: Reviewing t...
In this webcast, CMMC Architects, Gavin Jurecko & Matt Trevors will provide insight on how to evaluate and assess your organization’s readiness for meeting the practice requirements of CMMC Level 1.
Add Favorite
CyberCast: Secure Remote Access for Adm...
YOU’VE SECURED THE WORKFORCE, NOW SECURE PRIVILEGED ACCESS. Current work-from-home requirements have resulted in organizations enabling entire workforces for remote access. As the FBI and other agencies report, this is a boon for cyber attackers who see this expanded attack surface as a feeding frenzy opportunity. Organizations of all sizes are at increased risk and need to secure remote access for privileged users, whose identities can...
Add Favorite
What Is Cybersecurity Engineering and W...
When systems were predominately hardware-based, components were built to specification. Systems engineers defined and verified component functions and interfaces that together provided total system capability. Today, system capability is largely supplied through software components and network connectivity. This increases the system’s flexibility and adaptability—and its cyber risk! Software components are specified loosely, if at...
Add Favorite
Facing Insider Threats: Early Lessons L...
Facing Insider Threats The SolarWinds Hack and response is creating new cyber security science and awareness of survivorship bias. Since Dec 13th, 2020 DHS/CISA has issued elaborate, regularly updated guidance to all government agencies and private sector organizations on how to respond, contain, recover and mitigate unprecedented and immeasurable insider data breach risk posed by the Russian Intelligence APT29 group. To address newly discover...
Add Favorite
Back to Search Begin New Search