Monthly Archives: June 2021
The Best Kept Secret for Effective Managed Detection and Response (MDR)
It’s important to remember that MDR providers can only detect and respond to what they can see. For uncovered layers of the attack surface, security teams must have the people, process, and technology to monitor, detect and respond to advanced and evasive threats. The critical decisions you must address are: What is the scope of…
7 Secrets of Remote Device Management to Secure Your Remote Workforce – Quest/Kace
The shift to working remotely in 2020 caused most businesses to need to figure out how to maintain a secure and productive work environment for their employees. When looking at the practical application of just a varying set of personal and work devices used by remote workers to access internal applications, resources, and data, it…
Securing Your Castle in the Cloud – Entrust
You’re moving to the cloud, don’t forget to bring your security with you! We’ve all heard of the digital transformation. Well, we’re there. But there is still an IT transformation taking place and that comes in the form the cloud. Likely, you’re already doing business in the cloud. With so many business services and applications…
Active Directory Exploitation and Defenses for 2021 and Beyond – Attivo Networks
The issues regarding privilege escalation and lateral movement detection were a highlight of the SolarWinds Congressional hearings and in the news of many recent cyber heists. Compromising Active Directory has been a common element in all of these incidents and should be commanding every CISO’s attention. Join this webinar for a lively discussion and to…
The 7 Secrets of Digital Forensics – AccessData
Today’s digital forensics teams face many challenges in a world filled with an overwhelming amount of data. From multiple office locations and geographically dispersed remote workers, incident response teams and IT staff working on internal and external incidents need deep visibility into live data directly at the endpoint without the knowledge or observation of the…
Business Email Compromise: Don’t be the Next Victim the 5 Secrets to Defending your Email – RedSift
Phishing Attacks are the most prevalent attack vector for cyber crime. But hackers aren’t coming in through some backdoor… they are strolling in through your front door – weak, insecure, or misconfigured email. The best way to defend against the latest wave of these highly effective and damaging cybercriminal attacks is to understand their exploitation…
The Smart Approach to Building Comprehensive Cybersecurity Without Security Staff – Defendify
Evolved cyber threats aren’t targeting just large enterprise businesses. The challenge is, organizations with limited security resources and staff can’t manage a complicated (and often expensive) cybersecurity program. So how do you build comprehensive cybersecurity plans, policies, procedures, education, training, scanning, remediation, and more across your entire organization? Join 20+ year security veteran, and Co-Founder…
PKI-as-a-Service: Improve Security While Reducing Cost – HID Global
In this webinar, we explore public key infrastructure as a service (PKIaaS) and how this time-tested solution will provide organizations with a secure, certificate-based strategy that reduces the threat landscape. A cloud-based PKIaaS solution can reduce the complexity and expense of a traditional PKI deployment while enhancing performance. Learn how to unlock the full potential…
Stay Out of the Net: Your Ultimate Guide to Phishing Mitigation – KnowBe4
Spear phishing emails remain the most popular attack avenue for the bad guys, yet most companies still don’t have an effective strategy to stop them. This enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more. Don’t get caught in a phishing net! Learn how to avoid having your end…
Learn the Secrets of Unified Endpoint Management (UEM) to Boost End User Productivity – Quest Software
* Uncover the best-practices holistic view of UEM that most IT folks don’t know * Discover how to deal with user challenges including priviliged management * Find out why mobile device management doesn’t have to be your biggest headache and much more…presented by Jason Morano of Quest Software, hosted by Gary S. Miliefsky, Publisher of…
The Top 5 Automated Attack Vectors Targeting Your Applications & Customers and How to Stop Them
Sophisticated automated attacks and fraud actors are severely impacting applications, creating a heyday for cybercriminals to exploit stolen data and credentials for account takeover attacks. And like enterprises, bad actors are using automation to work faster and more efficiently. Today’s sophisticated attacks originates from infected consumer devices and mimics human behavior, flying under the radar…
Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network – KnowBe4
The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well,…
