Register for the Nautilus cyber-security webinar

Cyber-security is an increasing challenge for the shipping industry and Nautilus is stepping in to help members by co-hosting a special training webinar for seafarers in September. With high profile ransomware attacks on shipping companies such as Maersk and COSCO, operators are under pressure to improve their cyber-security and to develop improved measures to protect their systems from attack. However, there is evidence that many companies are not doing enough to educate seafarers about the risks of cyber-attacks or how to avoid them. Research by Nautilus showed that 86% of crew had never received any cyber security training from their employers. The Union is teaming up with security experts Appsecco and their specialist maritime division ShipSecure, to hold a webinar to raise awareness of cyber security issues onboard.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Key considerations for SaaS security and performance

Companies are turning to Software as a Service (SaaS) to ease their cloud transformation and increase agility. According to a Bettercloud survey, 73% of all companies say that nearly all of their apps will be SaaS by 2020. SaaS offers speed to market, great functionality, and lower IT operating costs. However, it can also create
Watch Now

Who Secures the Inbox Best? An Analysis of 3 Million Emails

Email is the number one cause of all cyber breaches. Yet, today's anti-phishing solutions haven't proven up to the task. As hackers step up their game, so too must email security. Recently, Avanan analyzed three million emails to understand how Microsoft Defender, and others, fare against the most sophisticated phishing threats.
Watch Now

Active Directory Best Practices to Frustrate Attackers

Black Hills Information Security

Active Directory out of the box defaults aren’t enough to keep your network safe. Here’s the word on the street about frustrating attackers in your Active Directory environment. It’s easy to make things hard. But it’s not hard to make things easy. Spin that how you will, running Active Directory efficiently isn’t necessarily easy, but it certainly can be easy to make things hard for attackers in your environment. Here are some baseline things you can do to make your Active Directory environment frustrating for attackers. Attackers’ main resource is time, and if you can slow them down and frustrate them, you have a better chance of making attackers look for easier targets, or at least more time for your response team to identify and protect your assets.
Watch Now

Attack Tactics 6! Return of the Blue Team

Black Hills Information Security

In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5. Introduction, password spray toolkit, account lockout, honey accounts, canary tokens, and two factor authorization. fixthefuture , two factor authorization, dumping global address lists, mailsniper 20:30 Lateral movement, OWA, VPN, SSH. Scanning and enumeration, Nmap, SSH Brute Force, “Find Open”, LLMNR, LLMNR Responder, and NrlmRelayX.
Watch Now

Spotlight

resources