Showing only posts by Elizabeth Coles. Show all posts.

Tsunami watch

Source

Mitigating the threat of bot-driven DDoS attacks Webinar It's sometimes easy to be lulled into a sense of false security and imagine that your organization or business will not become a target of highly professional cybercriminals, hacktivists and even nation-state actors. But the threat posed by DDoS attacks is …

Massive attack

Source

Defeating a DDoS swarm Webinar Any organization can lose service, revenue, and reputation as a result. If you are particularly unlucky, a DDoS attack can defenestrate your network defences. You may find yourself facing an cyber criminal who wants to take your business for everything it's got - not an …

Pulling the strings

Source

The critical rise of generative AI use in ransomware attacks on applications Webinar It's a fact of life that ransomware is a constant threat, like a dark cloud on every horizon. Recent research suggests that the volume of attacks has doubled in the last year.... [...]

The devil in the detail

Source

How AI is powering ransomware attacks on applications Webinar You could be forgiven for wondering if anything can ever again be completely straightforward or demonstrably authentic in a world where generative AI can masquerade convincingly as your mother, or express itself in the exact language your best friend might …

A clash of titans

Source

Shielding with protective AI from bad actors using AI for cyberattacks Webinar The one thing a cyber security team can rarely afford to do is relax its vigilance. But count the collective manhours spent on the frontline and the figure starts to look unsustainable, leaving many organizations with little …

Lethal weather

Source

Forecasting the flux and flow of threats to the cloud Webinar The cloud is floating around everywhere and with the rapid expansion of IT always comes new complexities that alter the threat landscape.... [...]

The downside of frenemies

Source

Are DevOps Tools a potential risk to your software supply chain security? Webinar Popular DevOps tools are great when it comes to helping developers optimize digital infrastructure, but there's a potential downside – the hidden risks they can contain which may compromise your supply chain.... [...]

Keeping secrets safe

Source

How to implement robust secret and identity management Webinar Keeping digital authentication credentials safe is a highly sensitive task in an ever-evolving IT landscape, made more difficult when you consider the ongoing shift from static to dynamic applications aligned with increasingly distributed teams of workers.... [...]

Secure mail

Source

Protection from business email compromise Webinar In the distant past, a master forger with a quill could fake a signature on the end of a letter but at least then you had time to consider the potential for fraud before any damage could be done. In the digital age …

Cutting complexity

Source

Ensuring cybersecurity defences do more with less Webinar It's like living in a fever dream out there in the world of cybersecurity. More and more sophisticated attacks, a tsunami of solutions offering a gilt-edged escape from the need to constantly reconfigure your defences, and relentless pressure to always stay …

Smart security

Source

Outlawing cybersecurity hype Webinar Trying to keep on top of all the hype and complexity in cybersecurity can be more than an just an uphill struggle and more like a veritable mountain to climb every morning.... [...]

Strengthening the human element

Source

How to locate cybersecurity risks in remote working Webinar The implementation of lockdowns during the maelstrom of the Coronavirus pandemic led to fast track changes to traditional work practices. To meet the challenges of operating in a global emergency, businesses and organizations of every kind had to urgently find …

« newer articles | page 2 | older articles »