Upcoming Webinars
Webinars – Where the Security World Learns
Below is a list of our upcoming webinars – a trove of valuable resources and information for the Security professionals.
You can also access past events and watch them on-demand. Registration is free. Enjoy!
You can also access past events and watch them on-demand. Registration is free. Enjoy!
Webinars List Navigation
Mobile Threats and Trends Changing Mobile App Security
Deploying your high-value mobile app to untrusted environments such as consumer mobile devices can be a risky proposition. Are some of your customers’ devices compromised? Do your users also download apps from ...
Breaking Down the Zero Trust and SASE Relationship
Headline-grabbing data breaches are starting to become the norm, making security leaders second-guess the approaches they use to protect their organizations. These alarming increases in cyber threats are fueled by the COVID-19 ...
How to Harden EKS With Terraform and Snyk
Misconfigurations in infrastructure-as-code (IaC) can be just as dangerous as vulnerabilities in code. Small mistakes in configuration can lead to the exposure of sensitive data on the internet, or private endpoints and ...
NOKIA Threat Intelligence Report 2021: Insights and Findings
A threat-informed defense strategy is a key attribute for organizations that can effectively prevent and respond to cybersecurity incidents. The Nokia Threat Intelligence Center examines malware network communications to develop detection rules ...
What’s Next for DevSecOps: ‘Shift Right’ for Runtime Protection
Shifting left – embedding security processes and output into the development pipeline – has been the focus for integrating security into DevOps for some time. Now that enterprises are approaching critical mass ...
Defending Against Emerging Ransomware Threats
If you think ransomware is bad now, well, just wait—it’s going to get a whole lot worse. As ransomware attacks and attackers become more sophisticated, cybercriminal gangs will rely less on broad-based ...
Finding the Ransomware Threat INSIDE Your Backups
During this livestream, cybersecurity expert and president and CEO at BetterCyber Luciana Obregon will break down how you can lower RTO and RPO and create a reliable data recovery workflow. Modern backup ...
Software Supply Chain Security
In the wake of a series of high-profile breaches, it’s become apparent how vulnerable software supply chains really are. Cybercriminals have increased their efforts to compromise developer credentials so they can embed ...
The Ultimate Guide to Container Security: Tips and Tricks for Success
As containers solidify their role in modern cloud-native IT development, the need for robust security measures is more crucial than ever. Containers’ popularity is growing due to their lightweight flexibility and speed, ...