Learn the Security and Privacy Best Practices to Manage the New California Privacy Regulations

IBM

Data security is moving to the top of the executive agenda, with companies paying more attention to what data they have, and how to protect it.  Organizations are rolling out more access controls and upgrading their monitoring and assessment capabilities to best manage new regulations on the horizon. California’s passing of the California Consumer Privacy Act of 2018 (CaCPA) on June 28 and adoption of a set of amendments to the law in September has proven to be a strong catalyst for a new focus on data security.
Watch Now

Spotlight

In Mobile Ad-hoc NETworks (MANETs) with high number of nodes and high mobility the routing of packets is a difficult task. In this paper, the authors are reviewing different geographic routing protocols as geographic routing are efficient for highly mobile nodes and made the communication scalable. Different protocols compared are the Distance Routing Effect Algorithm for Mobility (DREAM), Location Aided Routing (LAR) calculation, Greedy Perimeter Stateless Routing (GPSR) as of late new convention comes which is exceedingly proficient is the Adaptive Position Update (APU) strategy and further the improved APU strategy and on the basis of performance metrics the protocols are compared and reveals that the Improved APU strategy gives the high packet delivery ratio, lower delay and low energy consumption.

OTHER ON-DEMAND WEBINARS

Cybersecurity knowledge gap not uniform across sectors

Hrdive

Workers in finance know more than workers in other industries about cubersecurity, according to a report from Proofpoint. After analyzing more than 100 million answers to cybersecurity questions from employees in 16 industries, Proofpoint found that finance workers answered 80% of questions correctly. Transportation and education sector workers had the least knowledge among the various sectors, answering 24% of questions correctly on average, Proofpoint determined.
Watch Now

Sacred Cash Cow Tipping 2019

Black Hills Information Security

Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, “Why do these endpoint security bypass techniques still work? Why?” The goal of this is to share just some of the ways Black Hills Information Security bypassed endpoint security in 2018. Unfortunately, these webcasts still seem to be needed because there is a prevalent attitude that it is somehow possible to get endpoint security with full synergy and it will be bulletproof and under a single pane of glass. All with cyber threat intelligence and A.I. sprinkled in with a bit of EDR magic to stop all attacks.
Watch Now

Cyber Security for Ports and Terminals Webinar

ABS Advanced Solutions

With the recent increase in cyber-attacks on maritime ports and terminals worldwide, more focus is being placed on strategies to reduce cyber risk at maritime facilities. So what does a U.S. Coast Guard compliant cyber security Facility Security Plan (FSP) look like? In 30-minute On-Demand webinars, Captain Dave Nichols, USCG (ret.) Director, Business Development ABS Advanced Solutions ans Cris DeWitt Senior Technical Advisor ABS will provide an overview on maritime facilities with a particular focus on ISPS Regulated Facilities and how the various policies, guidance, and regulations are interconnected. Specific areas being discussed are what the expectations should be for ISPS Regulated Facilities and how proper Cyber Risk.
Watch Now

Your Network Needs to Be the First and Last Line in Your Cyber-Security Defense

VMware

Most people think firewalls when it comes to network security and defending against cyber-threats. But with today’s increasingly sophisticated cyber-security threats, you need to think beyond firewalls to your entire network—from center to edge. In this webinar, we will take a look how network virtualization can extend your security from data center, to branch, to cloud, to edge. In this webinar, you will learn: The latest outlook on the growing cyber-security threats. How you can better protect your data center by focusing on your network.How to extend your network and security to branches and beyond with software-defined WAN.
Watch Now

Spotlight

In Mobile Ad-hoc NETworks (MANETs) with high number of nodes and high mobility the routing of packets is a difficult task. In this paper, the authors are reviewing different geographic routing protocols as geographic routing are efficient for highly mobile nodes and made the communication scalable. Different protocols compared are the Distance Routing Effect Algorithm for Mobility (DREAM), Location Aided Routing (LAR) calculation, Greedy Perimeter Stateless Routing (GPSR) as of late new convention comes which is exceedingly proficient is the Adaptive Position Update (APU) strategy and further the improved APU strategy and on the basis of performance metrics the protocols are compared and reveals that the Improved APU strategy gives the high packet delivery ratio, lower delay and low energy consumption.

resources