Events
April Webinar: The Evolution of Authorization
Join us for our next free industry webinar in April: The Evolution of Authorization: How To Achieve Zero Standing Privileges. Organisations are struggling to deliver applications and services on time, often due ...
Techstrong Group Announces Rebranding of Security Bloggers Network to Security Creators Network
BOCA RATON, FL, April 9, 2024 — Techstrong Group, the power source for people and technology, is excited to announce the rebranding of the renowned Security Bloggers Network to the Security Creators ...
ATLSECCON 2024: Navigating the Future of Cybersecurity in Halifax
Explore ATLSECCON 2024: a journey through mindfulness, risk management, Active Directory security, understanding containers, and more in the far North of Halifax ...
Atlanta Cloud Conference 2024: Responsible AI Use And Securing Cloud Deployments
Dive into our recap of AltCloudCon, a community-led, developer-focused event offering practical insights for responsibly harnessing AI and securing cloud infrastructure ...
AI and Cybersecurity: Unveiling NSFOCUS’s Innovative Edge at HKIB Cybersecurity Solutions Day 2024
On March 15th, the Cybersecurity Solutions Day event, organized by the Hong Kong Institute of Bankers (HKIB), officially commenced. The event focused on addressing the increasingly complex cybersecurity environment influenced by AI ...
SCaLE 21x: A Community Event About Much More Than Linux
Read our highlights from SCaLE 21x, where the community focused on all things open source, not just Linux, with over 270 sessions on DevOps, cloud tech, and security ...
Alyssa Miller: Charting the Course Through InfoSec and Aviation
In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey ...
Civo Navigate 2024: Scaling Community And Containers In Austin
Read highlights from Civo Navigate 2024's community event, featuring insights on scaling containers, cloud-native security challenges, and high-availability practices ...
The-C2 Threat Intelligence Conference
A Guide to Fortifying Cyber Defence Following cyber security best practices is not enough. Excellence in the face of ever-evolving adversaries requires a proactive and strategic approach combined with a solid understanding ...
ChiBrrCon IV: Understanding risks and the role of the CISO
ChiBrrCon IV brought together the Chicago security community to learn about cybersecurity and risk management and heard from some of the folks CISOs report to ...