Phishing 101: Don't Take The Bait

Learn how to spot the signs of an attack. Get to know the various types of phishing campaigns. Understand who is being targeted & why.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

CIO on Data Privacy and Securing Sensitive Information Shared in the Cloud

Bank information security

As organizations are relying more and more on cloud collaboration tools to store and share sensitive customer data, security concerns abound. Failure to comply with regulation is not a risk worth taking, and the financial cost, time lost and reputation damage from even one data breach can jeopardize an entire company. After all, it is the people behind the files and sensitive data that you need to protect.
Watch Now

Creating a Modern Identity Strategy for Hybrid IT Environments

| Sponsored

The right identity platform is a crucial component in your digital transformation and modernization of enterprise IT. In the past, Identity and Access Management systems were decisions. With the move to web, cloud and mobile, IAM has become a key variable in the formula for achieving on-time deployments and the hardware, softwa
Watch Now

On-demand Webinar: IoT and Cybersecurity

Use your next 30 minutes to update you on IoT and Cybersecurity. During this on-demand webinar we are going to talk about Cyber security threats and challenges towards global or regional regulatory alignment? Standards and certifications Nemko Cyber Security Assurance services The schemes Key factors for the manufacturer to cover Common Criteria
Watch Now

Securing Organizations from Remote Desktop Protocol Exploits

HealthcareInfoSecurity

Insecure implementations of Remote Desktop Protocol have exposed organizations to serious risks of cyber attacks. Ransomware like SamSam and cryptominers like CrySis exploit insecure configurations, resulting in large and well-publicized breaches like the one that occurred at LabCorp. Because of the nature of Remote Desktop Protocol, these exposures often occur outside of organizations' known IP space, making them difficult to detect and remediate. This webinar will discuss how easily these misconfigurations can occur, how organizations can discover them, even outside of normal IP space, and how they can establish playbooks to remediate and reduce occurrence over time.
Watch Now