Webinar: The New EH-Net & Advancing Your InfoSec Career with Rafal Los

Join us for EH-Net Live! Free Webinar on April 26 The Ethical Hacker Network (EH-Net) is a free online magazine and community for security professionals. After being acquired by eLearnSecurity at the end of 2017, we’re thrilled to make it official that we’re back… and back in a big way. Ever since our inception over a decade ago, we have The post Webinar: The New EH-Net & Advancing Your InfoSec Career with Rafal Los appeared first on The Ethical Hacker Network.
Read more

Webinar: How to Kill Browser Tabs and Tickets Using PowerShell

Have you ever wanted to increase the automation of your IT processes, and kill some of the repetitive browser tabs that you keep open to use every day? It might not be as difficult as you think. JumpCloud® Senior Success Engineer, Scott Reed, recently did a webinar on this topic, and he showcased some real-world The post Webinar: How to Kill Browser Tabs and Tickets Using PowerShell appeared first on JumpCloud.
Read more

Key Takeaways: Using a Blacklist of Stolen Passwords [Webinar]

More than 90 billion passwords are being used across the web today, and it’s expected to be nearer 300 billion by 2020. With that in mind, the topics of password best practices and the threats around stolen credentials, remain top challenges for many global organizations. Security Boulevard recently hosted a webinar with Shape and cyber … Continue reading "Key Takeaways: Using a Blacklist of Stolen Passwords "
Read more

Netsparker and Brinqa to Partner on Web Application Security Webinar

This month, Netsparker will partner with Brinqa to deliver a webinar on how businesses and organizations can secure their most exposed attack surface – web applications. Web Application Attacks Are the Main Cause of Data Breaches According to the Verizon 2017 Data Breach Investigation Report, web application hacking is the primary cause of all data breaches (62%). This figure rises to 81% when breaches are leveraged by stolen or weak passwords. Most of these attacks are perpetrated by outsiders who are financially motivated, and have little compunction whether their target is a financial organization, a healthcare body, a public sector entity,...
Read more

We have Answers: Questions from the “Validating the Known” Webinar with IDC

Featured speaker Frank Dickson, IDC Research Director for Security Products, presented his new research: “Validating the Known: A Different Approach to Cybersecurity” He discussed why detection of malicious code can no longer protect your IT systems against cyberattacks Frank showed how new tactics based on “validating the known” can help boost IT security, and focused on The post We have Answers: Questions from the “Validating the Known” Webinar with IDC appeared first on Bromium.
Read more

The Evolution of DevSecOps Revisited

The inception of DevSecOps has created a whole new standard for driving innovation inside and outside organizations. Like DevOps, DevSecOps seeks to achieve greater efficiency and productivity through team collaboration coupled with a foundation in strong security. DevSecOps is pushing organizations to accomplish more, do it faster, and deliver better results more securely. We are... Read more » The post The Evolution of DevSecOps Revisited appeared first on Cloud Sentry Blog.
Read more

IDC’s Frank Dickson to Discuss Innovative Approaches to Cybersecurity [Webinar]

Frank Dickson, IDC Research Director, Security Products, authored the IDC Perspective, “Validating the Known: A Different Approach to Cybersecurity” Join this live webinar on February 22 to hear Frank present his research and ask him your questions Frank’s report looks at alternatives to detection-based security, including application isolation We’ve invited Frank Dickson, IDC Research Director, Security The post IDC’s Frank Dickson to Discuss Innovative Approaches to Cybersecurity appeared first on Bromium.
Read more

We Have Answers: Questions from 2018 Cybersecurity Core Capabilities Webinar

Nicolas Chaillan, cybersecurity architect who worked for Homeland Security in the United States provided guidelines for your 2018 cybersercurity strategy. It is based on what he built for Cyber.gov – a strategy that takes the best of the best and delivers results based on the level of security you need. His recommendations work for both The post We Have Answers: Questions from 2018 Cybersecurity Core Capabilities Webinar appeared first on Bromium.
Read more
Page 1 of 212