KuppingerCole
Unfortunately, most businesses are making the fundamental mistake when it comes to authentication and are thinking inside-out, but by thinking outside-in, they would automatically put the Customer first. Until now, strong (and not so strong) authentication to services seems to have been driven by an inside-out way of thinking. The institutions think about what works best for them: what fits into their infrastructure; what is the cheapest yet compliant approach? For customers, this means that they must use what their service provider offers to them. Companies must also be aware of insider risks and by implementing a Zero Trust approach of ‘never trust, always verify’, they can better secure the access to their assets. In this KuppingerCole webinar, we will address the following.
Watch Now
Eurofins Scientific
From vulnerable IoT devices to unsuspecting insiders, the reality of cyber security today is that we don’t know what’s lurking inside our networks. Faced with a looming shortage in cyber security skills professionals, combined with sophisticated threat-actors expanding their toolsets, AI-powered technology offers a proven approach to combat the threats that could already be inside the network – before they escalate into a crisis. Join Eurofins’s VP of Cyber Security, Sean Walls, and Darktrace’s Director of Enterprise Cyber Security, David Masson, to discuss how advances in autonomous AI are shaping the way security teams visualize, detect, and respond to emerging threats – all in real time.
Watch Now
Malwarebytes
It seems that criminal hackers are always a few steps ahead of everyone else and the recent onset of cryptojacking is a great example. In this webinar, independent information security consultant, professional speaker, and writer of Hacking For Dummies, Kevin Beaver, outlines what cryptomining and cryptojacking are and how they impact your business. He discusses strategies and tactics that you can use to ensure that your network and computer cycles are not used for someone else’s gains. From security policies and standards to endpoint controls to user training, this latest malware craze can be beaten but you must first understand it. Watch the replay and leave better prepared to address this threat.
Watch Now
As multi-cloud adoption accelerates, security teams are navigating the delta between each cloud provider’s native capabilities and comprehensive protection from bad actors.
Watch Now