Information is power: The role of threat intel in cloud security

Information is power: The role of threat intel in cloud security
Cloud security is complex. Join Omdia’s expert cybersecurity analysts as they discuss the complex nature of cloud security and provide insights into everything from threat intel and SaaS to infrastructure- and platform-as-a-service, customer responsibilities, emerging trends, and the kinds of tools available to help.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Multilayered Security with HAProxy Enterprise

Did you know that an HAProxy Enterprise load balancer can protect your applications from common threats? In this webinar, we’ll give you an overview of the multilayered security solution provided by HAProxy Enterprise.
Watch Now

2022 IT Trends and Cybersecurity Challenges – Part 1

With each new year’s planning, organizations must deal with both new and longstanding trends that have an impact on their cybersecurity profiles. This process is made even more difficult by an increasingly sophisticated threat landscape and a chronic cyber-skills shortage that impacts all organizations.
Watch Now

Kali Linux Overview: Tips, Tricks and Traps for Cybersecurity Professionals

CompTIA

Dr. James Stanger, CompTIA's Chief Technology Evangelist, has consulted with corporations, governments and learning institutions worldwide about cybersecurity, open source, network administration and help desk management for over 20 years. Organizations he has worked with include RSA, IBM, NTT Japan, Symantec, the Scottish Qualifications Authority (SQA), the US Department of Defense (DoD), the United Arab Emirates Cultural Division, the US Department of State, Meisei University, and General Dynamics.
Watch Now

2022 SANS Survey: State of Cloud Security in the Enterprise

More and more enterprises have moved their infrastructure and operations to the cloud than ever before. Along with these changes, we have also seen a significant change in enterprise security posture and use of technology. However, what does that change look like? How have security teams kept up with the change? Just what is the state of cloud security in the enterprise?
Watch Now