Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Webinar: Incident Response: Getting The Upper Hand in the Cybercrime Fight

    Webcasts // Sep 2017 // provided by Microsoft

    In this webinar, Ann Johnson, VP of Microsoft’s Enterprise Cybersecurity Group, sits down with a lead of Microsoft’s IR team to talk about what happens in the critical moments after MS IR teams engage with a customer under cyberattack. While no customer names will be revealed, the insights shared will ...

    Watch Now
  • Webinar: What Keeps CISOs Up At Night?

    Webcasts // Sep 2017 // provided by Microsoft

    Join Bret Arsenault, Microsoft Corporate Vice President in a conversation about strategic focus for enterprise-wide security. His discussion will include: Top-of-mind industry trends Effective security conversations with the Board of Directors How we protect Microsoft

    Watch Now
  • SSL Best Practices: Domain Protection

    Webcasts // Aug 2017 // provided by Entrust Datacard

    Phishing attacks are dangerous to your customers and could be detrimental to your brand. Securing your website and protecting your business are the cornerstone of Entrust SSL Best Practices. Join us for a complimentary webinar that covers key best practices for protecting your domain phishing attacks ...

    Watch Now
  • 5 Ways Security Impacts Website Engagement

    Webcasts // Aug 2017 // provided by Entrust Datacard

    Join cyber security leader SiteLock as they share insider tips on securing your website and web application that you can implement in your business right away. In this webinar, you will learn: How to avoid Internet blacklisting The latest technology used against malware ...

    Watch Now
  • Ensuring High-Quality Unified Communications

    Webcasts // May 2017 // provided by Savvius

    Unified Communications is still top of mind due to the implications it can have on the network. In a recent webinar, we discussed the challenges faced by those who have to ensure reliable, secure network performance. In this webinar, Jay Botelho, Director of Products at Savvius, will discuss solutions ...

    Watch Now
  • Live Webcast - Be Prepared for Ransomware

    Webcasts // May 2017 // provided by Kaspersky Lab

    Business halts … your files are inaccessible … you’re losing money, but your only option is to pay even more to a criminal who is holding your data for ransom. It might sound like a movie plot, but this is what happens when businesses like yours come face to ...

    Register Now
  • Data Protection in The Cloud

    Webcasts // May 2017 // provided by keepITsafe

    The last 12 months saw a material change in the way businesses utilize the cloud as a means of increasing productivity, protecting data, and maintaining business availability. With the rapid adoption of cloud security technologies, 2016 was a year filled with new mandates, shifts in how to do ...

    Watch Now
  • Security Investigations in the Real World

    Webcasts // Apr 2017 // provided by Savvius

    Renowned security investigator Keatron Evans, Managing Director of Blink Digital Security, demonstrates two real-world forensic investigations. He shows you features, short cuts, and strategies to drastically speed up your investigations.

    Watch Now
  • Live Webcast - Extortion and Ransomware: What you need to know

    Webcasts // Mar 2017 // provided by Zscaler

    The business of the cyberattack has matured into a billion dollar industry. Forrester even predicts the devastating effects of a cyberbreach will lead to the failure of a Fortune 1000 company in 2017 (Predictions 2017: Cybersecurity Risks Intensify, November 2016, Forrester). Extortion based attacks like Ransomware were rampant in 2016, ...

    Register Now
  • Testing NGFW: Three Points of Value Critical to Your Enterprise

    Webcasts // Nov 2016 // provided by ForcePoint

    The three key drivers of NGFW solution deployment success: Integration with security workflow, total cost of ownership and security effectiveness. Which solution will work best for your distributed enterprise? Security insight leaders NSS Labs shares its methodology for testing NGFW capabilities, including key features to consider when selecting a solution.

    View This Now