Everyone Loves Donuts, Especially Hackers

IBM

Donuts are just one of many ruses X-Force Red has up its sleeve. Tune into X-Force Red’s webinar on January 29 at 11am ET, to hear more real hacker stories. Find out how X-Force Red hackers have broken into companies worldwide, which tricks have worked and not worked, tools they have used, and what your company should do.
Watch Now

Spotlight

This video explains why the enterprise needs to invest in cybersecurity.According to a report by the world economic forum; analytics, big data, cloud computing could create between 9.6 Trillion and 21.6 Trillion in value for the global economy. However, if attacker capabilities outpace defender capabilities, this could result in an economic impact of 3 trillion dollars by the year 2020.Anji Technologies provides solutions including, risk analysis, preventing hardware malfunction, securing data, and authentication.

OTHER ON-DEMAND WEBINARS

Security Industry Financials – A Closer Look

Sia

Equities performed exceptionally well in 2017 on the back of strong corporate earnings, lax monetary policy, and the passing of major tax reforms. Notwithstanding the strength seen for a majority of the year, 2018 has been off to a rocky start, with volatility seen in both the debt and equity markets. Mack explained that where we are with tax reform and the strength in the economy that the security industry will continue to see reasonable growth in the equity capital markets over the next several years.
Watch Now

Anatomy of Container Attack Vectors and Mitigations

Data breach

Container adoption is skyrocketing, and so are concerns around securing container-based applications. While the market is still in its early phase of embracing this technology, lessons learned from securing Fortune 500 enterprise deployments against simple and sophisticated attacks alike are showing the path forward. Join us on an investigative journey as we explore popular attack vectors that have been used to breach container-based environments, provide best practices and tools to mitigate them, and discuss associated business risks.
Watch Now

How to Implement a Cybersecurity-first Culture for the Modern Workplace

The shift to the remote and hybrid workplace has presented new opportunities to hackers as they look to exploit weaknesses brought about by unfamiliar work practices, multiple and BYOD devices, and most importantly the busy day-to-day lives of our employees. According to email statistics, the average person receives over 100 emails per day (Earthweb), and with human error the cause of 85% of cyber security breaches (IBM) you can see why email is the number one threat vector.
Watch Now

Managing Threat Detection and Response for Securing AWS

Alert Logic

Security tools alone are not enough as your AWS environment becomes more complex, and the need for comprehensive security – including people, process, and technology – becomes apparent. Cyber threats continue to increase in volume and sophistication, so where do you start when incorporating advanced threat detection and response capabilities into your security strategy? Start here with Ryan Holland, Senior Director, Technology Services Group at Alert Logic and Orlando Scott-Cowley, Principal Evangelist at AWS as they list the top considerations to better protect your AWS workloads and applications.
Watch Now

Spotlight

This video explains why the enterprise needs to invest in cybersecurity.According to a report by the world economic forum; analytics, big data, cloud computing could create between 9.6 Trillion and 21.6 Trillion in value for the global economy. However, if attacker capabilities outpace defender capabilities, this could result in an economic impact of 3 trillion dollars by the year 2020.Anji Technologies provides solutions including, risk analysis, preventing hardware malfunction, securing data, and authentication.

resources