Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • The Secure DevOps Imperative Webinar

    Webcasts · May 2020 · Provided By Trend Micro

    Watching this webinar you will get an insight on the following topics: The Composition of Cloud Native Applications Challenges Securing Cloud Native Environments Secure DevOps Definition, Adoption and Best Practices Trend Micro Cloud One Overview Q&A Learn More Watch the Webinar now to find out more about the...

    Watch Now
  • Optimize Your SIEM Feed with syslog-ng

    Webcasts · May 2020 · Provided By One Identity

    Learn how your organizations can support a sudden move to a remote workforce. Syslog-ng has lots of experience helping customers and prospects to secure access to applications and systems for staff and contractors. Watch this on-demand webcast to learn how you can achieve efficient UDP log ingestion with syslog-ng...

    Watch Now
  • Make your network more visible with Mist Wired Assurance (SEA)

    Webcasts · May 2020 · Provided By Juniper Networks

    Networking has changed. The focus isn’t on better networks, it’s on better networking. Find out more on the Toolkit Tuesday: Experience Comes First with Mist Wired Assurance & learn how to: Get detailed insight into SLEs including proactive anomaly detection and switch health Drive better network performance with security...

    Sign Up
  • Make your network more visible with Mist Wired Assurance (IN)

    Webcasts · May 2020 · Provided By Juniper Networks

    Networking has changed. The focus isn’t on better networks, it’s on better networking. Find out more on the Toolkit Tuesday: Experience Comes First with Mist Wired Assurance & learn how to: Get detailed insight into SLEs including proactive anomaly detection and switch health Drive better network performance with security...

    Sign Up
  • 2020 Cyber Threats, Trends and Attacks Webinar

    Webcasts · Apr 2020 · Provided By Neustar

    Attackers have a myriad of ways to threaten your enterprise, from large DDoS attacks to precisely tailored threats that can take advantage of an unprotected API. In this on-demand webinar from Neustar, hear security experts Sandy Carielli, Principal Analyst serving Security & Risk Professionals, Forrester, and Michael Kaczmarek, Vice...

    Watch Now
  • Abracadabra of Malwares: Obfuscation

    Webcasts · Apr 2020 · Provided By Cisco

    Threat actors have access to all the security products, white papers and they even know how the internals of operating systems work. With all these crafts, information and tricks in hand they obfuscate the key components of malicious code to bypass security and antivirus systems. This webinar focuses on how...

    Watch Now
  • 3 steps to secure remote workers and students

    Webcasts · Apr 2020 · Provided By Cisco

    We’ve entered uncharted waters — but that doesn’t mean you’re left without a paddle and a lifejacket. As you navigate this new world of increased remote working, home-schooling, and telemedicine, there are some best practices you can adopt to help keep your employees, staff, and students safe. Join us for...

    Watch Now
  • Kaspersky CyberTrace

    Webcasts · Mar 2020 · Provided By Kaspersky

    Enhance your existing security controls and improve forensic capabilities with our up-to-the-minute and immediately actionable cyberthreat data. Learn more about: Kaspersky Threat Data Feeds allow instant threat detection and prioritization while providing rich and actionable context to guide further investigation By automatically matching the logs against your threat intelligence...

    Register Now
  • Kaspersky Threat Intelligence

    Webcasts · Mar 2020 · Provided By Kaspersky

    Counteracting modern cyberthreats requires a 360-degree view of the tactics and tools used by threat actors. Generating this intelligence and identifying the most effective countermeasures requires constant dedication and high levels of expertise. With petabytes of rich threat data to mine, advanced machine-learning technologies and a unique pool of world...

    Register Now
  • AppGate: Cracking the Zero Trust Code

    Webcasts · Feb 2020 · Provided By AppGate

    Practical ways for making your Zero Trust security transformation effective Organizations are moving toward the Zero Trust model, embracing one of the greatest advancements in security in the last 10 years. Due to the amount of noise on the subject, it may be challenging to understand how real-life companies...

    Watch Now