The New Cybersecurity: Leveraging the Cloud and Big Data

"We need a new cybersecurity model. One which will reduce the current insane complexity, handle the megavolumes of security events, and provide adequate defenses to organizations of all sizes and technical sophistication.
Fortunately, two maturing new technologies are available to point the way. First, the Cloud already provides a cost-effective Software-as-a-Service (SaaS) model. In similar fashion, the Cloud can be leveraged for Security-as-a-Service. In this model, large and sophisticated Cloud Service Providers (CSPs) provide the security experts, toolsets, and up-to-date threat information, all on a pay-as-you-go basis. Small and mid-sized organizations gain the same benefits as large ones.
The second technology is so-called Big Data which provides capabilities to analyze gigantic, rapidly growing datasets, such as security log files, to detect patterns, the evidence of ongoing or potential cyber-attacks; all in near real-time.
This session will review these exciting concepts which address the current cybersecurity issues while simultaneously reducing costs and simplifying the management headaches."
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Shifting Security Left with env0

Infrastructure and application deployment automation is not new. Tools like CI/CD pipelines and more have been around for a while. But what happens when you need to add in other operational tasks? Checking budget, checking performance, checking security. All of these things are very important to the business and should not be an afterthought. In this webinar, we will talk about shifting security left in your Infrastructure as Code Automation workflows. We'll be joined by Sean O'Dell, Director of DevRel at Accurics. We'll integrate Terrascan into a workflow, and show the power of dealing with security in each and every deployment or update.
Watch Now

3-Minute Video: Overcoming the Challenges of an Unplanned Distributed Workforce

When the world stayed home overnight, organizations had to rapidly solve the challenges of an unplanned distributed workforce – from maintaining visibility across the IT environment and tracking corporate and BOYD devices to closing existing and new vulnerability gaps. Tanium's unique structure was built for these challenging en
Watch Now

Securing Organizations from Remote Desktop Protocol Exploits

HealthcareInfoSecurity

Insecure implementations of Remote Desktop Protocol have exposed organizations to serious risks of cyber attacks. Ransomware like SamSam and cryptominers like CrySis exploit insecure configurations, resulting in large and well-publicized breaches like the one that occurred at LabCorp. Because of the nature of Remote Desktop Protocol, these exposures often occur outside of organizations' known IP space, making them difficult to detect and remediate. This webinar will discuss how easily these misconfigurations can occur, how organizations can discover them, even outside of normal IP space, and how they can establish playbooks to remediate and reduce occurrence over time.
Watch Now

What is a Secure Software Development Framework?Enable Ginger

Application security is more than penetration testing. Organizations face a dilemma. Commercially, there is increasing pressure to shorten software release cycles, which in turn adds strain on software developers to produce faster release cycles. This in turn creates an environment where speedy release cycles take priority over
Watch Now