IT Trends in 2018: Cybersecurity

Dimension Data

2017 saw a wave of high profile hacks, Ransomware attacks and data security breaches which pushed cybersecurity even further up the business agenda. With customers more concerned about this issue than ever before, companies are turning to technologies such as Artificial Intelligence, blockchain and deep learning software to help them in the fight against digital crime and secure customer data.
Watch Now

Spotlight

Cellphone theft has been rising quite considerably. So much so that the chances of getting your device snatched is becoming a scarily common occurrence. In London, 314 phones are stolen everyday, which is 70% of all the personals taken. In San Francisco,  40% of all the robberies in 2012 were of cellphones. This is no wonder when we take into account that carrying a smartphone, the majority of phones stolen, is akin to carrying $300+ in one tiny piece of equipment and that there is plenty of black market for such products in the world.


OTHER ON-DEMAND WEBINARS

2017 Top 5 Cybersecurity Threats

NopSec

Discover the Most Dangerous Cybersecurity Threats of The New Year. Michelangelo Sidagni serves as Chief Technology Officer leading technical development, security research and operations for NopSec. Michelangelo holds numerous professional certifications in information security including CISSP, CISA, and CIA, and is a frequent speaker at information security events around the country.
Watch Now

Application Security at the Speed of DevOps

Paladion

Faster time-to-market and business value driven application functionality are the biggest drivers for DevOps. With DevOps, more frequent releases require shorter development and test cycles creating a higher risk of breaches exploiting the application layer.
Watch Now

"What happened next? Detecting an attack in real-time"

arbor networks

"You get an alert on an attack. You check it out and you find a real breach. You are able to stop it. Job done. Or is it? Do you know how the attacker got in? Do you know if this is the only system they compromised? Do you know what they did next, before you found them? In this session, Arbor will show you the importance of understanding lateral movement and the ability to understand the entire extent and impact of a breach. Know if your compromised system was used to attack further hosts and if so what was done. Build an evidence trail that can be used to identify every facet of the attack and the methods used, quickly and simply"
Watch Now

Top 5 Reasons Hackers Want Your Employees’ Mobile Devices

Zimperium

While most organizations are realizing that they need to protect their employees’ mobile devices in order to protect confidential corporate data, some companies try to remain blissfully naive to the hacking opportunities smartphones and tablets present. Given the ever-growing use of mobile devices and the number of mobile cyberattacks, companies can no longer plead ignorance to these mobile threats.
Watch Now

Spotlight

Cellphone theft has been rising quite considerably. So much so that the chances of getting your device snatched is becoming a scarily common occurrence. In London, 314 phones are stolen everyday, which is 70% of all the personals taken. In San Francisco,  40% of all the robberies in 2012 were of cellphones. This is no wonder when we take into account that carrying a smartphone, the majority of phones stolen, is akin to carrying $300+ in one tiny piece of equipment and that there is plenty of black market for such products in the world.

resources