With supply chain transparency and digital transformation being among the top organizational priorities, cyber-related issues have become one of the top risks to businesses.
Most companies don't consider their supply chain vulnerability when thinking about cybersecurity. Yet, supply chain risks could include multiple functions across the flow of information, products and services – needing the attention of all entities involved. Supply chain security is every company's responsibility.
Watch Now
Join us for an exciting webinar on the cutting-edge technology of AI and machine learning, and how it is transforming the world of cybersecurity. Flare’s Head of Software Development Alexandre Viau, Data/AI Lead Francois Masson, and Director of Marketing Eric Clay will discuss the latest developments in the field, including the innovative GitHub Copilot and ChatGPT, as well as the vendors who are using AI to improve their cybersecurity capabilities. We will also delve into the growing threat of AI-powered attacks, and how organizations can stay ahead of these sophisticated adversaries.
Watch Now
Malwarebytes
It seems that criminal hackers are always a few steps ahead of everyone else and the recent onset of cryptojacking is a great example. In this webinar, independent information security consultant, professional speaker, and writer of Hacking For Dummies, Kevin Beaver, outlines what cryptomining and cryptojacking are and how they impact your business. He discusses strategies and tactics that you can use to ensure that your network and computer cycles are not used for someone else’s gains. From security policies and standards to endpoint controls to user training, this latest malware craze can be beaten but you must first understand it. Watch the replay and leave better prepared to address this threat.
Watch Now
WorkCast
Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us and Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, we'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.
Watch Now