Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Abracadabra of Malwares: Obfuscation

    Webcasts · Apr 2020 · Provided By Cisco Umbrella

    Threat actors have access to all the security products, white papers and they even know how the internals of operating systems work. With all these crafts, information and tricks in hand they obfuscate the key components of malicious code to bypass security and antivirus systems. This webinar focuses on how...

    Watch Now
  • 3 steps to secure remote workers and students

    Webcasts · Apr 2020 · Provided By Cisco Umbrella

    We’ve entered uncharted waters — but that doesn’t mean you’re left without a paddle and a lifejacket. As you navigate this new world of increased remote working, home-schooling, and telemedicine, there are some best practices you can adopt to help keep your employees, staff, and students safe. Join us for...

    Watch Now
  • Cost of Missing Threat Intel : Lessons from $81mn Bangladesh Bank Cyber Heist

    Webcasts · Mar 2020 · Provided By Kaspersky

    With the fast-paced technological breakthroughs happening one after the other, what are the lessons the past has to offer? Let’s find out in the upcoming APAC Virtual Cyber Insights session on March 25, 2020 at 1.30 PM Singapore Time (GMT+8), where Stephan Neumeier, Managing Director, Kaspersky APAC, will be...

    Register Now
  • Cracking the Zero Trust Code

    Webcasts · Feb 2020 · Provided By AppGate

    Practical ways for making your Zero Trust security transformation effective Organizations are moving toward the Zero Trust model, embracing one of the greatest advancements in security in the last 10 years. Due to the amount of noise on the subject, it may be challenging to understand how real-life companies...

    Watch Now
  • How to Reduce Your Attack Surface

    Webcasts · Feb 2020 · Provided By AppGate

    Learn the fundamentals for becoming a smaller target with Zero Trust Security Whether it’s adoption of the mobile workforce, heterogeneous and on-demand infrastructure or the proliferation of devices connecting to your corporate network, your attack surface is both a challenge and a risk. Join AppGate and Optiv as...

    Watch Now
  • AppGate: How to Reduce Your Attack Surface

    Webcasts · Feb 2020 · Provided By AppGate

    Learn the fundamentals for becoming a smaller target with Zero Trust Security Whether it’s adoption of the mobile workforce, heterogeneous and on-demand infrastructure or the proliferation of devices connecting to your corporate network, your attack surface is both a challenge and a risk. Join AppGate and Optiv as...

    Watch Now
  • AppGate: Cracking the Zero Trust Code

    Webcasts · Feb 2020 · Provided By AppGate

    Practical ways for making your Zero Trust security transformation effective Organizations are moving toward the Zero Trust model, embracing one of the greatest advancements in security in the last 10 years. Due to the amount of noise on the subject, it may be challenging to understand how real-life companies...

    Watch Now
  • Threat Intelligence – the new driver for incident response

    Webcasts · Feb 2020 · Provided By Cisco

    Malware in financial services has grown 24x. SLED is facing 70X more malicious cryptomining. Professional services has 20x more ransomware. Threats are not slowing down. If you’re swimming in silos and relying on tools that don’t integrate or share intelligence it’s only going to be harder to respond. You...

    Watch Now
  • Webinar: Anatomy of Credential Theft Q&A with Brian Hay

    Webcasts · Feb 2020 · Provided By LastPass

    Watch a Q&A Session with Brian Hay, Former Detective Superintendent from the Queensland Police Service and now Executive Director of Cultural Cyber Security. Bringing almost 40 years of expertise in the security space, Hay is a renowned evangelist and thought leader. Some of the topics covered are: The...

    Watch Now
  • 12/10/19 SANS webcast: The 5 Most Dangerous New Attack Techniques: Are They Evolving?

    Webcasts · Jan 2020 · Provided By RSA Conference

    Each year at RSA Conference, SANS Institute provides an authoritative summary of the most dangerous new attack techniques. Their 2019 list included accurate predictions of smartphone attacks, DNS manipulation, domain fronting, cloud-on-cloud attacks and CPU flaws. Learn more about their 2019 list, see new data about how these attacks have...

    Watch Now