Another Bucket Bites the Dust... Simplifying AWS Cybersecurity

Alert Logic

With the rapid rise of web application attacks, which is the number one source of data breaches, securing cloud-based web applications is a challenge. In order to fully protect your web applications in the cloud, it is important to know the risks, select the right security tool, and understand your role in the shared responsibility for security. Securing your AWS workload can mean many different things, ranging from locking down your environment via the AWS best practices list, to completely outsourcing the security management and responsibility to another company.  While every company’s security journey is different, everyone can agree that the need to monitor and improve security posture is becoming increasingly important.
Watch Now

Spotlight

Peter W. Singer speaks on the lecture theme The Ethics of Privacy in the Amphitheater. This event tool place on July 8, 2014. Perhaps the most urgent topic of Chautauqua Institution’s 2014 season, “The Ethics of Privacy” is a week of themed programs that will deeply analyze a subject that continues to play prominently on national newscasts, newspaper fronts and magazine covers.

OTHER ON-DEMAND WEBINARS

Must-Have Enterprise Mobile Security RFP Section: Advanced, Purpose-Built Threat Detection

Zimperium

Mobile operating systems (OSs) are fundamentally different from other endpoint OSs. Simply porting a security solution developed for a different platform over to mobile is inadequate and can leave your enterprise vulnerable. Effective enterprise mobile security requires a purpose-built solution that: Can protect mobile devices against known and unknown threats. Operates effectively even when an attacker controls the network.
Watch Now

Through the Hacker’s Eyes: Detecting Attacks on Fully Patched Windows Machines

IBM

To successfully stop hackers, you need to understand them; how their minds work, what their goals are, and which techniques they use to break through your defenses. In this special edition of QRadar’s Under the Radar technical demo series, NA Security Architect and QRadar expert Jose Bravo will demonstrate first hand the sophisticated ways in which hackers today compromise Windows systems, even when they are fully patched and have antivirus deployments. He will then walk through how QRadar is able to detect these SIE technology-evading attacks, keeping your most vital data safe from unwanted eyes.
Watch Now

Mid-year Data Breach Update: How the Latest Cyberthreat Trends Can Impact Your Identity Security

Last year saw a historic number of data breaches that exposed the personal information of millions of individuals to possible risk. In our new 15-minute webinar, we’ll be joined by the Identity Theft Resource Center (ITRC) to review 2022’s threat trends, the risks to businesses, and how employees and consumers can help protect their identity, credit and other personal data.
Watch Now

Information is power: The role of threat intel in cloud security

Cloud security is complex. Join Omdia’s expert cybersecurity analysts as they discuss the complex nature of cloud security and provide insights into everything from threat intel and SaaS to infrastructure- and platform-as-a-service, customer responsibilities, emerging trends, and the kinds of tools available to help.
Watch Now

Spotlight

Peter W. Singer speaks on the lecture theme The Ethics of Privacy in the Amphitheater. This event tool place on July 8, 2014. Perhaps the most urgent topic of Chautauqua Institution’s 2014 season, “The Ethics of Privacy” is a week of themed programs that will deeply analyze a subject that continues to play prominently on national newscasts, newspaper fronts and magazine covers.

resources