Inside the Front Lines of Cyber Defense

Alert Logic

A Security Operations Center (SOC) provides proactive threat monitoring, threat detection, and advice to stop threats quickly. But you may be surprised at what goes on behind the scenes to keep you safe.  Hear first-hand how our SOC team works tirelessly to thwart attackers — from the analysts themselves. We’ll also discuss Alert Logic’s new cybersecurity report which shows how broad, continuous assaults of massive scale dominate today’s attacks.
Watch Now

Spotlight

For the third consecutive year, Keyfactor and The Ponemon Institute have collaborated on the State of Machine Identity Management report —an in-depth look at the role of PKI and machine identities in establishing digital trust and securing modern enterprises. This year’s report provides an analysis of 1,280 survey responses from

OTHER ON-DEMAND WEBINARS

Top 5 Reasons Hackers Want Your Employees’ Mobile Devices

Zimperium

While most organizations are realizing that they need to protect their employees’ mobile devices in order to protect confidential corporate data, some companies try to remain blissfully naive to the hacking opportunities smartphones and tablets present. Given the ever-growing use of mobile devices and the number of mobile cyberattacks, companies can no longer plead ignorance to these mobile threats.
Watch Now

Stage 4 – Response: The fourth layer of your cyber-defence-in-depth strategy

Implementing a cyber security incident response management plan means you won’t waste valuable time when the worst happens. Cyber incident response is a part of wider business continuity management. It helps you put plans in place to cover all types of unplanned disruption, from cyber security incidents to natural disasters, from power outages to pandemics.
Watch Now

Addressing Cybersecurity Challenges In Open Source Software: Expert Panel Livestream June 28, 2022

Open source software (OSS) has had a tremendous impact on the development and distribution of the software we depend on today. Through its collaborative and open way of both developing and sharing software components, OSS has served as a key engine for innovation and encouraged the widespread reuse and sharing of core software components. Organizations of all sizes are heavily reliant on software, and much of that software supply chain consists of open source software components. Because of this, open source software has cybersecurity implications.
Watch Now

Security Weekly Webinar: Cyber Threat Intelligence – How to Do It Wrong

ThreatConnect

Tune in to watch Security Weekly’s Paul Asadoorian and John Strand discuss threat intelligence with Jason Cohen, Threat Intelligence Research Engineer at ThreatConnect. Learn about the shortcomings and misuses of threat intelligence to better understand how it can be used effectively and bring real value to your security operations.
Watch Now

Spotlight

For the third consecutive year, Keyfactor and The Ponemon Institute have collaborated on the State of Machine Identity Management report —an in-depth look at the role of PKI and machine identities in establishing digital trust and securing modern enterprises. This year’s report provides an analysis of 1,280 survey responses from

resources