How to Remain Secure, Protect Data, and Stay Compliant in the Face of End of Life Operating Systems

Carbon Black

The ever-changing threat landscape continues to challenge businesses who attempt to protect critical data, improve security posture, and remain compliant. That challenge is intensified when adding the constant risk of operating systems going end of life and pushing endpoints out of compliance against many modern data security laws, regulations, and compliance policies. The risk is too great and businesses can no longer afford to take a passive stance when it comes to maintaining system endpoints and ensuring that vulnerabilities are in check.
Watch Now

Spotlight

Cyberattacks can compromise the ability of water utilities to provide safe water to customers, erode customer confidence, and result in financial and legal liabilities. A robust water system cybersecurity program can effectively reduce or even eliminate the vulnerabilities that cyberattacks exploit. Read the solution brief to fi

OTHER ON-DEMAND WEBINARS

Security Holes In The Machine Learning Pipeline

Python is the second most popular language and is very easy to start using. It is almost a de-facto standard in machine learning. Here be dragons! Many machine learning (ML) models are Python pickle files under the hood. The use of pickling conserves memory, enables start-and-stop model training, and makes trained models portable (and, thereby, shareable).
Watch Now

Mitigating DDoS Attacks and Malware Spread

Modern malware, ransomware, and DDoS attacks have become a big issue for organizations of any size. Zero Trust strategies, in addition to application and DDoS protection, are a way to help deal with these issues. Most internet traffic is encrypted today, threat actors are using encryption to hide their attacks. Organizations must rely on TLS/SSL decryption and inspection to protect their users and networks. This is key to employing a strong Zero Trust strategy. We will explore these concepts in this research backed webinar.
Watch Now

Stopping Email-Borne Threats Before They Spread

Mimecast

Your organization likely has extensive security protections for your inbound email from the Internet. However, as much as two-thirds of many organizations’ total email traffic is generated internally by users. And, of course, attackers know this. Are you inspecting your internal email with the same diligence as your inbound email? What about the emails being sent out to your partners, suppliers, and customers? Attend this webinar to take a step inside your organization’s entire email traffic to learn about: The latest techniques that attackers are using to target your users. How attacks are spread both internally and externally. Advanced security and automation to defend your organization from compromised users and internal threats.
Watch Now

Beyond ChatGPT, Building Security Applications using OpenAI API

ChatGPT was launched by OpenAI in November 2022. Since then, it has been the subject of many discussions. ChatGPT itself is one application that was built on top of OpenAI’s GPT-3 models. We can programmatically interact with these models via OpenAI API. In this talk, we will go beyond ChatGPT and discuss OpenAI API, fine-tuning our own models for specific tasks, and building security applications on top of them. We will be building a sample application that interprets human requests and performs the basic tasks requested.
Watch Now

Spotlight

Cyberattacks can compromise the ability of water utilities to provide safe water to customers, erode customer confidence, and result in financial and legal liabilities. A robust water system cybersecurity program can effectively reduce or even eliminate the vulnerabilities that cyberattacks exploit. Read the solution brief to fi

resources