NEWS

   

EVENTS

Conferences

Cyber Security for Critical Assets APAC

CYBER SECURITY FOR CRITICAL ASSETS APAC

January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

National Cyber Summit

NATIONAL CYBER SUMMIT

June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...

BsidesPhilly2020

BSIDESPHILLY2020

December 04-04, 2020
BSidesPhilly seeks to create awareness and improve upon the conversation and research of security topics within the Philadelphia region for researchers, professionals, and practitioners alike.  The conference aims to give these various groups a chance to meet, engage in conversation through sch...

31st ISF Annual World Congress

31ST ISF ANNUAL WORLD CONGRESS

November 14-17, 2020
The ISF provides Members with a trusted and confidential environment within which their in-depth knowledge and practical experience can be shared. This approach enables the ISF to harness the collective insights and knowledge of its Members to deliver leading-edge solutions that are comprehensive, p...

Ignite cyber security conferences

IGNITE CYBER SECURITY CONFERENCES

November 09-12, 2020
Join us at Ignite cybersecurity conference and be prepared to get your hands on the most advanced security technology and see firsthand what it can do for you. With customized learning paths scaled for both beginner and advanced, this four-day event will be overflowing with technical hands-on learni...

Ignite 20

IGNITE 20

November 09-12, 2020
Ignite 20 USA is a security conference that covers topics such as: Threat Prevention; Application framework and next-generation security platform, Public cloud security, Advanced endpoint protection, Protecting data in SaaS applications, etc.

 

Webinars

FEB 10, 2021 | 11:30 PM
ROI AND BEYOND FOR THE CLOUD
Moving to the cloud isn't just about pulling expensive equipment out of a data center. Going with a cloud provider involves its own set of costs. However, a cloud strategy offers other business benefits, some that can be calculated on a dollar basis and others that are on the softer si...

CREATING A MODERN IDENTITY STRATEGY FOR HYBRID IT ENVIRONMENTS
Sponsored
The right identity platform is a crucial component in your digital transformation and modernization of enterprise IT. In the past, Identity and Access Management systems were decisions. With the move to web, cloud and mobile, IAM has become a key variable in the formula for achieving on-t...
ENSURING SECURITY VALUE THROUGH OUTCOME-BASED MDR
Managed detection and response (MDR) solutions identify active threats across an organization and then respond to eliminate, investigate, or contain them. MDR has increased in visibility and importance as organizations realize that no level of investment will provide 100% protection agains...
TRENDS IN PRIVACY AND DATA SECURITY
Privacy and data security remains a central issue, capturing the attention of consumers, regulators, and boards of directors. In this complimentary webinar, Mel Gates, Senior Legal Editor of Privacy and Data Security at Thomson Reuters, will cover: Data privacy compliance issues, with a sp...
THE VALUE OF DIVERSITY AND INCLUSION FOR LAW DEPARTMENTS
The recent Thomson Reuters/Acritas 2019 State of the Corporate Law Department report found that gender-diverse teams achieved significantly higher performance ratings, mirroring earlier research on corporate boards and teams in general. Similar results have been shown for other categories ...
THE NEW INTELLIGENT EDGE
AI. 5G. CLOUD. THE WORLD IS DIGITALLY TRANSFORMING. ARE YOU READY FOR THE NEW INTELLIGENT EDGE? Learn about the four drivers of digital transformation at the intelligent edge and the key questions that will help architect your success. By 2025, an estimated 41 billion connected devices wil...
DEVOPS WITH SIMULATION
Are you considering using simulation to develop and test your software or applications? Make continuous integration and DevOps possible for embedded development. Find out how to: Provide a 24/7 automated test lab for your entire team Increase test automation by 12,000% Achieve 30% faster t...

RESOURCES

On their road to recovery from the pandemic, businesses face unique dilemmas. This includes substantial and entirely necessary investments in digital transformation, however tight budgets are making s...

I would like to share my experience with you and talk about viruses created for Mac devices and how to deal with them. You may say that there are no Mac viruses as Apple does not allow it. However, I ...

1. Zero Trust – DemystifiedEveryone seems to be talking about Zero Trust in the security world at the moment. Unfortunately there seems to be multiple definitions ...

Still think your current martech stack doesn't need an upgrade? Think again. 2019 is gradually coming to a close and marketing channels have shown no signs of slowing down. If you’re a marke...

The aim of marketing is to make selling superfluous.” Peter F. Drucker Tweet This! While selling is an art, it solely depends on the fact how much marketing efforts you have put in t...

Achieving Resilience in Your Distributed Workforce Environment During the COVID-19 Pandemic and Beyond The COVID-19 pandemic forced organizations across the world to transition their workforce to a re...

The ongoing pandemic has forced organizations across the globe to install work-from-home policies. A majority of the workforce in various industries, especially IT, have already adapting to working re...

There are several reasons to choose Linux over other operating systems such as Windows and macOS. Linux is an open-source, secure, and very lightweight operating system consuming minimal system resour...

Just about every single day, somewhere in the world, a company falls victim to cyber attackers, even with millions spent on cybersecurity.Every company is a target because they have da...