Wealth Wizards: Threat Detection with Amazon GuardDuty and Alert Logic

As part of its broader Managed Threat Detection and Response offering, Alert Logic provides an AWS-native security service that shows why, where, and how to respond to Amazon GuardDuty findings, while continuously assessing AWS configurations to find exposures and recommend actions that prevent future compromises. In this webinar, you'll learn how Wealth Wizards, a financial services company, utilizes AWS services such as Amazon GuardDuty and leverages Alert Logic to gain additional security context, actionable remediation steps, and protection.
Watch Now

Spotlight

Organizations are losing IT and security control Once upon a time, IT and security teams focused mostly on managing their organization’s on-prem environment. But as business requirements changed, customer bases became global, and remote work took root, these technology teams were handed responsibility across more domains: cloud

OTHER ON-DEMAND WEBINARS

IDaaS: Your Identity Fabric. Connecting Every User to Every Service, Seamlessly

IBM

Workforce mobility, rapidly changing business models and business partnerships contribute to a trend where businesses must be able to seamlessly enable access for everyone, to every digital service. These services might be public cloud, they might be web applications with or without support for federation standards, they might be solely backend services accessed via APIs, or even legacy applications exposed only via some sort of middleware. However, agility in the digital journey mandates that IT can provide seamless access to all these services while keeping in control and enforcing security. Identity as a Service offering, whether deployed from a public or hybrid cloud, can take a central role, by acting as the common fabric connecting all the users and all the services. Such services include support for adaptive authentication, auditing features, broad federation services, authorization capabilities, and various capabilities.
Watch Now

Bug Bounties and How They Help

Trend Micro

Once a vulnerability becomes known to cybercriminals, the race is on for vendors to create a patch before it is exploited. And with the regular use of exploits in attacks and threats like the WannaCry ransomware using a vulnerability, getting the win has never been so crucial. This month we will cover the bug bounty marketplace, including the different types of markets available to vulnerability researchers. As well, we will review Trend Micro Research and how their research can benefit organizations through responsible disclosure and pre-disclosed filters to virtually patch vulnerabilities.
Watch Now

APAC | The State of Cybersecurity in 2022

In the midst of accelerating digital transformation that has redesigned IT infrastructure over the past two years with remote work, cloud-first strategies, and increasing strain on budget and resources, security teams have never been under more scrutiny to be ahead of the curve.
Watch Now

Extend your Attack Surface Coverage with No SIEM Required

Alert Logic

Attend this webinar to learn about new capabilities that Alert Logic has added that extends attack surface coverage for Endpoint, Multi-Cloud, and Dark Web. Get broader detection and response for less effort and lower cost with no SIEM required.
Watch Now

Spotlight

Organizations are losing IT and security control Once upon a time, IT and security teams focused mostly on managing their organization’s on-prem environment. But as business requirements changed, customer bases became global, and remote work took root, these technology teams were handed responsibility across more domains: cloud

resources