Showing only posts by Elizabeth Coles. Show all posts.

Derisking your CNI

Source

How to strengthen cyber risk management for cyber physical systems (CPS) Webinar Can organizations ever scale back on the relentless task of identifying, prioritizing, and remediating vulnerabilities, and misconfigurations across their industrial and critical infrastructure environments?... [...]

Tips on meeting complex cloud security challenges

Source

Learn about the benefits of applying advanced automation to policy management practices Webinar Dealing with the double trouble of relentless cyber threats and regular technology refresh cycles can stretch already overworked security practitioners. And orchestrating the transition to cloud-native applications and multi-cloud architectures doesn't make things any easier.... [...]

Harness the power of security automation

Source

How to ensure policy management keep up with the risks to data integrity presented by the cloud Webinar The complexity facing businesses as they make the necessary transition to cloud-native applications and multi-cloud architectures keeps cloud teams firmly on the frontline when it comes to implementing security policies.... [...]

Read the clouds, reduce the cyber risk

Source

Why a one-size- fits- all approach to cloud security is unlikely to work in multi-cloud deployments Webinar In the natural world, there are ten different kinds of cloud - a rare simplicity in meteorological terms. But in our global business environment, there's no single defining feature to aid classification.... [...]

The XBOM vs SBOM debate

Source

Why an eXtended Software Bill of Materials could be the next step up in cybersecurity Webinar A Software Bill of Materials (SBOM) has become a non-negotiable requirement to meet regulatory and buyer requirements. But does this provide enough protection if it can give only a partial view into interconnected …

Securing frontline Operational Technology environments

Source

How Britvic outlawed security blind spots Webinar Organisations in multiple industries often face risks which can severely impact their operational resilience. Cyber criminals like to use ransomware and vulnerable third-party connections to hijack operational technology (OT) systems which can stop production in manufacturing environments, for example.... [...]

Redefining united data protection

Source

Where adopting a resilient and integrated approach to backup and disaster recovery makes sense Webinar There is no longer an off button for businesses and organizations, no closed signs, or downtime. This means enterprise IT operations and data assets must be protected round the clock in all operating environments …

Malice in the mail

Source

Defence against the dark arts of phishing Webinar Almost half of all losses to cybercrime come from Business Email Compromise (BEC), according to the FBI. It appears that even the most astute among us can fall foul of a cunningly crafted phishing email masquerading as a missive from a …

Safe delivery

Source

How to protect organizations from Business Email Compromise Webinar It is a stratospheric number of emails pinging around the globe and the sheer volume offers a seductively lucrative phishing opportunity to the legion of bad actors out there.... [...]

page 1 | older articles »