Identity: the new security perimeter
What to do when your MFA is mercilessly attacked by hackers Webinar Threat actors are always looking for that easy way in by testing weak spots, and user identities are one of their favourite targets.... [...]
What to do when your MFA is mercilessly attacked by hackers Webinar Threat actors are always looking for that easy way in by testing weak spots, and user identities are one of their favourite targets.... [...]
Meeting the challenges of managing risk for cyber-physical systems Webinar The risk of cyber attack hangs over every digital environment but cyber physical systems (CPS) tend to be more vulnerable - after all, they weren't usually designed with security in mind.... [...]
How to strengthen cyber risk management for cyber physical systems (CPS) Webinar Can organizations ever scale back on the relentless task of identifying, prioritizing, and remediating vulnerabilities, and misconfigurations across their industrial and critical infrastructure environments?... [...]
Facing down the triple threat of ransomware, data breaches and criminal extortion Sponsored On the face of it, there really isn't much of an upside for the current UK government after MPs described its response to attacks by cyber-espionage group APT31 as 'feeble, derisory and sadly insufficient.'... [...]
The prima facie case for real-time threat intelligence Webinar Cybercriminals are always on the hunt for new ways to breach your privacy, and busy supply chains often look like a good way to get in under the wire.... [...]
Using threat intelligence to mitigate against security breaches Webinar There are some unhappy projections out there about the prevalence of third-party security breaches.... [...]
Everything you need to know about quantum safe encryption Webinar The quantum threat might seem futuristic, more like something you'd encounter in a science fiction film. But it's arguably already a danger to real cyber security defences.... [...]
How zero trust controls and Google AI can strengthen your organization’s defences Webinar Dealing with cyber security incidents is an expensive business. Each data breach costs an estimated $4.35 million on average and it's not as if the volume of cyber attacks is falling - last year, they …
Learn about the benefits of applying advanced automation to policy management practices Webinar Dealing with the double trouble of relentless cyber threats and regular technology refresh cycles can stretch already overworked security practitioners. And orchestrating the transition to cloud-native applications and multi-cloud architectures doesn't make things any easier.... [...]
How to ensure policy management keep up with the risks to data integrity presented by the cloud Webinar The complexity facing businesses as they make the necessary transition to cloud-native applications and multi-cloud architectures keeps cloud teams firmly on the frontline when it comes to implementing security policies.... [...]
Complying with the EU’s NIS2 Directive Webinar It was growing threat levels and an increase in reported cybersecurity attacks since digitalization which pushed the European Union to introduce the original Network and Information Security (NIS) Directive in 2016.... [...]
From APIs to Zero Trust Webinar It has become possible to swiftly and inexpensively train, validate and deploy AI models and applications, yet while we embrace innovation, are we aware of the security risks?... [...]
Should you be paying more attention to securing your AI models from attack? Webinar As artificial intelligence (AI) technology becomes increasingly complex so do the threats from bad actors. It is like a forever war.... [...]
How to have zero trust connectivity and optimize the remote user experience Webinar Remote working has rapidly become the norm for many organizations and isn't ever going away. But it still needs to be secure if it's to be a success.... [...]
Protecting your cloud from cyber security threats starts by understanding what it’s telling you Webinar In China, clouds are a symbol of luck. See multiple layering of clouds in a blue sky can mean you are in line to receive eternal happiness.... [...]
Why a one-size- fits- all approach to cloud security is unlikely to work in multi-cloud deployments Webinar In the natural world, there are ten different kinds of cloud - a rare simplicity in meteorological terms. But in our global business environment, there's no single defining feature to aid classification.... [...]
Why an eXtended Software Bill of Materials could be the next step up in cybersecurity Webinar A Software Bill of Materials (SBOM) has become a non-negotiable requirement to meet regulatory and buyer requirements. But does this provide enough protection if it can give only a partial view into interconnected …
Preventing cybercriminals from exfiltrating your data with ADX technology Webinar It seems counterintuitive to want to lock in a cybercriminal who has crept past all your defences to smuggle data out from under your nose.... [...]
Ensuring data stays secure even after cyberattack infiltration Webinar Daily incursions are underway with the aim of removing every bit of data that you've got - the cyber criminals' aim is to break in and get out again laden with digital booty.... [...]
How Britvic outlawed security blind spots Webinar Organisations in multiple industries often face risks which can severely impact their operational resilience. Cyber criminals like to use ransomware and vulnerable third-party connections to hijack operational technology (OT) systems which can stop production in manufacturing environments, for example.... [...]
Learn how Britvic eliminates blind spots in Operational Technology systems Webinar Cyberattacks on industrial control systems are becoming more common, and there isn't likely to be a let up any time soon.... [...]
Watch our webinar to hear more about comprehensive data protection from Zerto and HPE Webinar It's a challenge to maintain the availability and security of mission critical data in today's environment. As IT teams know only too well, there's no quiet season for enterprise IT operations or cyber threats …
Where adopting a resilient and integrated approach to backup and disaster recovery makes sense Webinar There is no longer an off button for businesses and organizations, no closed signs, or downtime. This means enterprise IT operations and data assets must be protected round the clock in all operating environments …
Defence against the dark arts of phishing Webinar Almost half of all losses to cybercrime come from Business Email Compromise (BEC), according to the FBI. It appears that even the most astute among us can fall foul of a cunningly crafted phishing email masquerading as a missive from a …
How to protect organizations from Business Email Compromise Webinar It is a stratospheric number of emails pinging around the globe and the sheer volume offers a seductively lucrative phishing opportunity to the legion of bad actors out there.... [...]