NEWS

   

EVENTS

Conferences

Bsides Seattle 2020

BSIDES SEATTLE 2020

April 18-18, 2020
Bsides Seattle is a community based conference for individuals in or interested in Information Security. Founded in 2012, Bsides Seattle continues to provide space for the open sharing of ideas, concepts and debates.

ContentTECH Summit

CONTENTTECH SUMMIT

April 20-22, 2020
Our ContentTECH mission is clear: We want to show how the effective use of technology and better processes can help your strategic efforts to create, manage, deliver and scale your enterprise content and provide your customers with better digital experiences. Come to the ContentTECH Summit to learn ...

 ICS cyber security conference

ICS CYBER SECURITY CONFERENCE

April 28-30, 2020
As the most established Industrial Control Systems Cyber Security Event in Europe, the ICS cyber security conference brings together leading practitioners, operators and decision makers form across Europe to share a wealth of  practical experience in implementing cyber security in organisations...

2020 Cybersecurity and Privacy Protection Conference

2020 CYBERSECURITY AND PRIVACY PROTECTION CONFERENCE

April 30-30, 2020
A truly cross-sector event now in its 5th year, Cleveland-Marshall’s Cybersecurity and Privacy Protection Conference is one of the leading educational and networking events in the Great Lakes Region, and features rich content of interest to legal and compliance professionals, information techn...

 Aprimo Sync! 2020 (Global)

APRIMO SYNC! 2020 (GLOBAL)

April 07-09, 2020
Join us at Aprimo Sync! 2019 to experience peer-driven interactive discussions led by industry thought leaders, on-site and off-site networking opportunities with peers and leaders, and more. Early bird pricing is still available!

Black Hat Asia 2020

BLACK HAT ASIA 2020

March 31-03, 2020
Black Hat returns to Marina Bay Sands in Singapore, March 31 - April 3, 2020. The information security community comes together for esteemed Trainings taught by industry experts, innovative research presentations at Briefings, the latest open-source tool demos in Arsenal, and the Business Hall featu...

RICHMOND CYBER SECURITY FORUM

RICHMOND CYBER SECURITY FORUM

April 01-01, 2020
The Richmond Cyber Security Forum in London will include a first class, CPD accredited conference programme of keynotes, interactive workshops, think tanks and personal development sessions. The opportunity to connect and engage with industry peers in a relaxed informal setting and the chance to dis...

Infosec World

INFOSEC WORLD

March 30-01, 2020
The cybersecurity community is diligent when it comes to continuous learning and refining their expert knowledge, but the task is daunting when emerging technologies keep changing what it means to be secure. Add distrustful individuals to the mix, and it’s nearly impossible to predict what the...

 

Webinars

APR 15, 2020
AI, MACHINE LEARNING, BEHAVIORAL ANALYSIS AND BLOCKCHAIN: THE NEXT GENERATION OF CYBERSECURITY
AI, machine learning, behavioral analysis, and blockchain are on the bleeding edge of security solutions technology, and may be the key to current and future threat detection and mitigation. While many companies are just beginning to explore uses for these technologies, many security techn...
APR 15, 2020 | 2:00 PM
RANSOMWARE PREPAREDNESS & RECOVERY
Ransomware is the epitome of cybersecurity threats and has proven to be one of the most prominent methods of cyberattack in 2019. In fact, the cost of an average data breach to companies worldwide is $3.86 million, according to a study by Norton Security. In addition, IDG says that total c...
APR 15, 2020
THE 2020 STATE OF IBM I SECURITY: THREATS, TRENDS, AND PREDICTIONS
Cyber threats are becoming more ferocious than ever. What are IBM i pros doing in 2020 to keep up? Join this live webinar for new data on the IBM i security controls deployed at organizations around the globe. Security experts Robin Tatam and Sandi Moore will reveal intelligence gathered f...
APR 16, 2020 | 10:00 AM
ZERO TRUST: A CYBERSECURITY ESSENTIAL AND THE KEY TO SUCCESS
In our increasingly cloud-first world, the idea of a trusted internal network zone and an untrusted external one is now outdated. The truth is, today’s cyber-threats often get past perimeter defenses undetected, so you can no longer trust data traffic – no matter where it origi...
APR 16, 2020 | 10:00 AM PST-11:00 AM PST
NEW INSIGHTS AND RESEARCH INTO ATTACK SURFACE REDUCTION
Most organizations believe they have their network locked down: they know what they have exposed to the Internet and what they have safely protected behind the firewall. But the truth is that almost no major organization has a complete picture of its true Internet attack surface. This webi...
APR 16, 2020 | 2:30 PM
CORONAVIRUS UPDATE: THE LATEST CYBER SECURITY THREATS FACING CONSUMERS & SMES
In this webinar series we will be providing updates on the latest cyber security threats and how to reduce your online risks. If you missed the first webinar in this series, we covered vulnerable industries, hacking group MAZE and discussed examples of COVID-19 specific business and consum...

KNOCK, KNOCK! WHO’S THERE. FINDING OUT WHO’S REALLY ON THE OTHER END OF THAT PASSWORD
As businesses settle into a hybrid world of on-prem, public cloud, private cloud infrastructure with security delivered as a service and all of this overlaid with the concept to Zero Trust, what is left? Companies will have the data they are trying to protect and the identity of the user t...
SOLICITA UNA DEMOSTRACIÓN EN DIRECTO DE DYNAMICS 365 SUPPLY CHAIN MANAGEMENT
Fija una cita para una orientación personalizada en directo sobre cómo puedes aumentar al máximo la eficiencia operativa y en la cadena de suministro, la calidad de los productos y la rentabilidad con el IoT (Internet de las cosas), datos e inteligencia de IA para obtener conocimientos úti...
SOLICITA UNA DEMOSTRACIÓN EN VIVO DE DYNAMICS 365 FINANCE
Programa un tutorial individual en vivo para saber cómo Microsoft Dynamics 365 Finance puede ayudar a todo el personal de tu organización a tomar decisiones inteligentes que mejoren los procesos e impulsen el crecimiento. En esta demostración personalizada, verás cómo Dynamics 365 te ofrec...
KEY CONSIDERATIONS FOR SAAS SECURITY AND PERFORMANCE
Companies are turning to Software as a Service (SaaS) to ease their cloud transformation and increase agility. According to a Bettercloud survey, 73% of all companies say that nearly all of their apps will be SaaS by 2020. SaaS offers speed to market, great functionality, and lower IT oper...
5 REASONS WHY A PEOPLE-CENTRIC SECURITY STRATEGY SAFEGUARDS SENSITIVE INFORMATION AND FACILITATES COMPLIANCE
Users often ignore internal security controls in order to get work done quickly. This puts the security of confidential information at risk. Tune in to this webinar to learn why a people-centric approach to security is the best way to protect your company’s sensitive data and IP, to achiev...
WE'RE NAMED A LEADER. AGAIN. GARTNER MAGIC QUADRANT FOR UEM TOOLS
Gartner has named us a Leader for unified endpoint management tools (UEM) again in 2019.* Whether desktops, laptops, smartphones, tablets, or IoT, our solution makes it easier for IT teams to take a modern, secure approach to managing all devices. All from a single platform. Download the 2...

RESOURCES

What races through your mind when you see “Coronavirus” or “COVID-19”? Fear, anxiety, curiosity… these internal reactions can prompt actions that we may not normally tak...

A new list of most and least cyber secure U.S. states shows a disturbing lack of cybersecurity best practices. According to Webroot‘s fourth annual ranking, New York, California, Texas, Alabama ...

Given recent M&A activity in the cybersecurity space (involving Broadcom, Symantec, Accenture, and more), many are reconsidering the tools being used for monitoring SSL/TLS traffic for intrusion, perf...

Given recent M&A activity in the cybersecurity space (involving Broadcom, Symantec, Accenture, and more), many are reconsidering the tools being used for monitoring SSL/TLS traffic for intrusion, per...

Given recent M&A activity in the cybersecurity space (involving Broadcom, Symantec, Accenture, and more), many are reconsidering the tools used for monitoring SSL/TLS traffic for intrusion, performan...

Given recent M&A activity in the cybersecurity space (involving Broadcom, Symantec, Accenture, and more), many are reconsidering the tools used for monitoring SSL/TLS traffic for intrusion, performanc...

With so many of us hunting out the latest Covid-19 info, it hasn’t taken long for hackers to take advantage. So first off, a basic hygiene reminder: Don’t download anything or click on any...

With millions of employees having to work from home, companies are having to look at how to keep as many business-critical functions running as possible while at the same time maintaining adequate sec...

Oftentimes, our social media video marketing efforts are weighed down by our own customers for the lack of thoughtful stories that can touch upon them. These are like run-of-the-mill, telling everythi...