Endpoint Security: The Final Frontier

Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient in using the latest prevention and protection technologies.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Zimperium & IBM MaaS360

Zimperium

Zimperium has integrated IBM MaaS360 into zConsole, the administrative console that supports our award-winning mobile threat defense (MTD) solution, zIPS. With “Zimperium for MaaS360,” MaaS360 owners can now detect mobile risks and threats with Zimperium, and then set compliance and remediation policies them via MaaS360. Watch our on-demand webinar to learn more about Zimperium’s integration with IBM MaaS360. In this recorded event, we review how Zimperium and IBM work together, including: Deployment / activation.
Watch Now

Navigating the IT Security Certification Labyrinth

udemy

Cybersecurity remains a top priority for IT teams, but how can you prepare you and your team with the right skills? One of the challenges in IT security is the complex web of 200-300 different IT certifications. How can you navigate the IT security certification labyrinth and identify the best pathway for you and your team?
Watch Now

Anatomy of Container Attack Vectors and Mitigations

Data breach

Container adoption is skyrocketing, and so are concerns around securing container-based applications. While the market is still in its early phase of embracing this technology, lessons learned from securing Fortune 500 enterprise deployments against simple and sophisticated attacks alike are showing the path forward. Join us on an investigative journey as we explore popular attack vectors that have been used to breach container-based environments, provide best practices and tools to mitigate them, and discuss associated business risks.
Watch Now

The Era of Digital Transformation: Building A Privacy and Security Practice in the Ever-Changing Landscape

This has been the year of digital transformation and adapting to new risks we never expected. This increased use of new technologies, combined with more and diverse personal data being collected, stored, and used, has catapulted us into a new era of privacy risk considerations.
Watch Now