Securing the cloud comes with many challenges, which have further been compounded with the pandemic and the increased attack surface the cloud brings. As part of a global research project, Vectra surveyed security professionals to find out the impact the past 12 months have had on their organisation’s corporate risk profiles and their own jobs.
Watch Now
The phishing threat has advanced. Stopping these threats requires a solution that’s built from the ground up using Artificial Intelligence (AI) and Machine Learning (ML). The architecture of yesterday’s rules and signature-based solutions simply are not equipped to handle these threats. In fact, of today’s advanced phishing threats, 51% require AI/ML to identify and stop. AI is clearly essential for cybersecurity. But the type of AI matters.
Watch Now
InfoSec Institute
Ever wish you had a cybersecurity expert on-call to answer your career questions? Here’s your chance! In this open Q&A webinar, Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security, will answer anything and everything related to getting started in cybersecurity and helping take your career to the next level. Submit your questions before the webinar for your chance to win a year’s subscription to Infosec Skills, our new on-demand training platform. Or simply join us on June 28 at 11 a.m. Central see what’s on the minds of your fellow infosec professionals.
Watch Now
Security Boulevard
When usernames and passwords are compromised in a data breach, the consequences extend far beyond the victim organization due to rampant password reuse. For this reason, NIST recently recommended that organizations check users’ credentials against a set of known compromised passwords. However, by patroning dark web forums and paying for spilled credentials, enterprises indirectly support the criminal ecosystem. Furthermore, attackers often don’t publicly post stolen data until months or years after the breach, if at all. Is there a better way to follow NIST guidelines and protect users from account takeover? Join Justin Richer, co-author of NIST Digital Identity Guidelines 800-63B, and Gautam Agarwal, Shape's Senior Director of Product Management, for a lively discussion on NIST’s password recommendations and how best to prevent account takeover fraud at your organization.
Watch Now