Monthly Archives: June 2021

The Best Kept Secret for Effective Managed Detection and Response (MDR)

It’s important to remember that MDR providers can only detect and respond to what they can see. For […]

Posted in Cybersecurity Webinars On Demand, Webinars | Leave a comment

7 Secrets of Remote Device Management to Secure Your Remote Workforce – Quest/Kace

The shift to working remotely in 2020 caused most businesses to need to figure out how to maintain […]

Posted in Cybersecurity Webinars On Demand, Webinars | Leave a comment

Securing Your Castle in the Cloud – Entrust

You’re moving to the cloud, don’t forget to bring your security with you! We’ve all heard of the […]

Posted in Cybersecurity Webinars On Demand, Uncategorized | Leave a comment

Active Directory Exploitation and Defenses for 2021 and Beyond – Attivo Networks

The issues regarding privilege escalation and lateral movement detection were a highlight of the SolarWinds Congressional hearings and […]

Posted in Cybersecurity Webinars On Demand, Uncategorized | Leave a comment

The 7 Secrets of Digital Forensics – AccessData

Today’s digital forensics teams face many challenges in a world filled with an overwhelming amount of data. From […]

Posted in Cybersecurity Webinars On Demand, Uncategorized | Leave a comment

Business Email Compromise: Don’t be the Next Victim the 5 Secrets to Defending your Email – RedSift

Phishing Attacks are the most prevalent attack vector for cyber crime. But hackers aren’t coming in through some […]

Posted in Cybersecurity Webinars On Demand, Uncategorized | Leave a comment

The Smart Approach to Building Comprehensive Cybersecurity Without Security Staff – Defendify

Evolved cyber threats aren’t targeting just large enterprise businesses. The challenge is, organizations with limited security resources and […]

Posted in Cybersecurity Webinars On Demand, Uncategorized | Leave a comment

PKI-as-a-Service: Improve Security While Reducing Cost – HID Global

In this webinar, we explore public key infrastructure as a service (PKIaaS) and how this time-tested solution will […]

Posted in Cybersecurity Webinars On Demand, Uncategorized | Leave a comment

Stay Out of the Net: Your Ultimate Guide to Phishing Mitigation – KnowBe4

Spear phishing emails remain the most popular attack avenue for the bad guys, yet most companies still don’t […]

Posted in Cybersecurity Webinars On Demand, Uncategorized | Leave a comment

Learn the Secrets of Unified Endpoint Management (UEM) to Boost End User Productivity – Quest Software

* Uncover the best-practices holistic view of UEM that most IT folks don’t know * Discover how to […]

Posted in Cybersecurity Webinars On Demand, Uncategorized | Leave a comment

The Top 5 Automated Attack Vectors Targeting Your Applications & Customers and How to Stop Them

Sophisticated automated attacks and fraud actors are severely impacting applications, creating a heyday for cybercriminals to exploit stolen […]

Posted in Cybersecurity Webinars On Demand, Uncategorized | Leave a comment

Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network – KnowBe4

The scary fact is that human error is a contributing factor in more than 90% of breaches. With […]

Posted in Cybersecurity Webinars On Demand, Uncategorized | Leave a comment