Mobile IoT – Are you Cybersecurity Ready?

The Mobile IoT market is set for rapid growth over the coming years and providers are concentrating more on rapid widescale deployment with security often being a later consideration. This is not a tenable position as IoT applications can be mission critical and security needs to be at the forefront of any solution. In this webinar, MEF Advisor Andrew Parkin-White is joined by two security experts: Ian Smith, IoT Security Lead at the GSMA and Stephen Fitzpatrick, VP IoT at Cellusys.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Through the Hacker’s Eyes: Detecting Attacks on Fully Patched Windows Machines

IBM

To successfully stop hackers, you need to understand them; how their minds work, what their goals are, and which techniques they use to break through your defenses. In this special edition of QRadar’s Under the Radar technical demo series, NA Security Architect and QRadar expert Jose Bravo will demonstrate first hand the sophisticated ways in which hackers today compromise Windows systems, even when they are fully patched and have antivirus deployments. He will then walk through how QRadar is able to detect these SIE technology-evading attacks, keeping your most vital data safe from unwanted eyes.
Watch Now

On Demand Utilizing Data to Eradicate Threats With Splunk & Zscaler

Modern zero trust requires the right architecture, analytics, dynamic policy, and risk visibility in order to reduce the attack surface, prevent lateral movement, and make real-time threat determinations with each transaction. Zscaler and Splunk tightly integrate best-of-breed cloud security and security analytics platforms to
Watch Now

2022 IT Trends and Cybersecurity Challenges – Part 1

With each new year’s planning, organizations must deal with both new and longstanding trends that have an impact on their cybersecurity profiles. This process is made even more difficult by an increasingly sophisticated threat landscape and a chronic cyber-skills shortage that impacts all organizations.
Watch Now

Active Directory Best Practices to Frustrate Attackers

Black Hills Information Security

Active Directory out of the box defaults aren’t enough to keep your network safe. Here’s the word on the street about frustrating attackers in your Active Directory environment. It’s easy to make things hard. But it’s not hard to make things easy. Spin that how you will, running Active Directory efficiently isn’t necessarily easy, but it certainly can be easy to make things hard for attackers in your environment. Here are some baseline things you can do to make your Active Directory environment frustrating for attackers. Attackers’ main resource is time, and if you can slow them down and frustrate them, you have a better chance of making attackers look for easier targets, or at least more time for your response team to identify and protect your assets.
Watch Now