Webinar
Avert cyberattacks against MFA using FBI-recommended countermeasures [Webinar]
With the rise of remote work, multi-factor authentication (MFA) has become more essential than ever. MFA can be used to protect authentications happening on different resources like workstations, VPNs, and enterprise applications. MFA ...
Retrospectives, Predictions, and Philanthropy: Giving Back Tuesday 2020 – A $5 Donation for Every Attendee
With positive news on a vaccine, a faint light has begun to appear at the end of the 2020 tunnel. Yet, for many, 2020 has brought about a new way of life ...
The Era of Digital Transformation: Building A Privacy and Security Practice in the Ever-Changing Landscape
Inventa Supervised AI Solutions CCPA Compliance GDPR Compliance LGPD Compliance Sustainable Data Discovery Data Mapping and Lineage File Analysis and Data Classification Inventories Data Subject Rights Data in Motion Third-Party Sharing Risk ...
How the HR System Enabled my Promotion to CEO
Just kidding. I am happy to remain an individual contributor. However, if the HR system API had been implemented without the appropriate levels of authorization control, commonly referred to as broken object-level ...
Webinar Recap: The Failed Promises of SIEM
MixMode teamed up with Ravenii to host a webinar focused on the history and evolution of SIEM platforms, their ideal role in a SOC today, and how they fall short as a ...
WEBINAR: Maturing your risk program with ServiceNow Advanced Risk.
Risk leaders continue to feel pressure from both regulators requiring more sophisticated and advanced risk reporting and from senior execs to reduce costs due to the economic downturn, as a result, risk ...
Webinar: The Failed Promises of SIEM – What’s Next For Cybersecurity
The Security Operations Center (SOC) of today is fundamentally flawed. Currently enterprise cybersecurity spend is higher than ever, but despite multi-million dollar cybersecurity investments, organizations remain vulnerable to attacks. One of the ...
Get Ready— It’s Almost Bots Attack Week!
All next week, experts from Cequence Security will be sharing key threat research findings and best-practice recommendations for protecting your organization from threats such as API abuse, account takeovers, fake account creation ...
Help! There’s an OpenBullet Attack Config for Our Site – What Should we Do?
Thinly veiled as a web testing tool, OpenBullet a commonly used attack management toolkit that allows a bad actor to create and execute automated account takeovers and other types of attacks. Complete ...
Data Privacy During Economic Downturn: How to Make It Work With Limited Resources?
Inventa Solutions CCPA Compliance GDPR Compliance LGPD Compliance Sustainable Data Discovery Data Mapping and Lineage File Analysis and Data Classification Inventories Data Subject Rights Data in Motion Third-Party Sharing Risk and Governance ...

