Adopting a Purpose-Built Approach to Linux Security

Carbon Black

Cloud is the dominant computing trend of our time, and Linux is the power behind it. As enterprises continue to adopt more cloud native infrastructure, we see accelerated adoption of Linux in the form of both migrations of existing infrastructure and greenfield application deployment. Unfortunately the approach to securing this growing fleet of production servers has not evolved at the same pace.
Watch Now

Spotlight

The Darwinistic nature of the cyber threat landscape ensures advancements in defender capabilities will be reciprocated by the refinement of threat actor tools and tactics, techniques and procedures (TTPs). The manifestation of these advancements in the underground allows us to monitor and analyze emerging threats early in their

OTHER ON-DEMAND WEBINARS

Microsoft 365 Security in the Face of Increased Mobility & Security Breaches

With technological advancements taking the world by storm, almost every other company is now a software company. All these companies are slowly moving to the cloud to reduce IT investment. Whether it is delivering personalized apps, or employing software to improve internal processes or managing business transactions – it is all on the cloud. This recent expansion of technology has made the threat of cyberattacks exceedingly prevalent and more aggressive.
Watch Now

A CIO’s guide to maximizing the value of integration and APIs

From our work with thousands of enterprise customers around the world, we’ve learned that API-led connectivity brings major benefits like increased speed, agility, and scalability. Now, CIOs and chief architects across all industries can measure these benefits objectively. In this webinar, Forrester consultant Corey McNair and M
Watch Now

Private Equity Cybersecurity: Preliminary Look at Exclusive Compliance Checklist

ACG

Join ACG’s Private Equity Regulatory Taskforce (PERT) and Dennis Johnson, Wipfli LLP Risk Advisory Services Manager, as they divulge pertinent information about the best-in-class Wipfli Cybersecurity Checklist. The Cybersecurity Checklist is an exclusive perk for PERT members. However, all webinar attendees will benefit from an illuminating glimpse into the cybersecurity resource. The Cybersecurity Checklist helps firms to measure cybersecurity functions at their particular institution. It does this by using the PERT’s exclusive Cybersecurity “Principle” and the SEC’s cybersecurity guidance.
Watch Now

Transform Security and Risk Into a Business Function: A Panel Discussion

Gartner

As organizations and governments race towards digital transformation, they expose themselves to a variety of risks that traditional information and cybersecurity practices are not accustomed to encountering. In the face of technology evolution, regulatory complexity, an increasing threat landscape and limited resources, will security and risk leaders be able to align to the ambitious goals set by their business leaders? In this unique complimentary live video discussion, 4 leading Gartner security & risk experts debate how the nature of risks are evolving and what you can do to transform security and risk into a business function.
Watch Now

Spotlight

The Darwinistic nature of the cyber threat landscape ensures advancements in defender capabilities will be reciprocated by the refinement of threat actor tools and tactics, techniques and procedures (TTPs). The manifestation of these advancements in the underground allows us to monitor and analyze emerging threats early in their

resources