Security News

Cyber Security WEBINAR — How to Ace Your InfoSec Board Deck
2022-04-06 08:15

On the one hand, security leaders and CISOs must be able to communicate strategies clearly - instructions, incident response plans, and security policies. More so than just talking about the dollar value of a security policy security leaders need to show the importance of processes, tasks, decisions, and how threats and other security risks impact the math.

On-demand webinar: Demystifying zero trust to protect connected assets in OT
2022-03-16 03:45

Over the past few years, zero trust has become a commonly used phrase for security professionals. While we may understand that a zero-trust framework or architecture should be implemented as part of network or cybersecurity measures, what does this practically mean for operational technology? What does zero trust actually entail, and how does it keep critical assets safe?

LIVE Webinar: Key Lessons Learned from Major Cyberattacks in 2021 and What to Expect in 2022
2022-03-02 02:29

Over the course of 2021 we saw an increase in multiple attack approaches; some old, some new. In an upcoming webinar, Cybersecurity company Cynet will provide an in-depth review of the high-profile attacks we saw in 2021 and provide guidance to cybersecurity professionals for 2022.

[Webinar] When More Is Not Better: Solving Alert Overload
2022-02-16 07:46

An upcoming webinar by cybersecurity company Cynet sheds light on alert overload, the result of too many alerts. Then Cynet will talk about the way out - something important to almost every company suffering from alert overload. The Real Impact of Alert Overload. It's interesting that threat alerts, which are so vital to protection have also become an obstacle.

Cynet Log4Shell Webinar: A Thorough - And Clear - Explanation
2022-02-04 00:34

Most security practitioners are now aware of the Log4Shell vulnerability discovered toward the end of 2021. The past couple of months have had security teams scrambling to patch the Log4Shell vulnerability found in Apache Log4j, a Java library widely used to log error messages in applications.

Webinar: How to See More, But Respond Less with Enhanced Threat Visibility
2022-01-26 05:40

An upcoming webinar tries to help lean security teams understand how to tackle this intractable problem. While adding security solutions to cover blind spots seems logical, the webinar will argue that this just leads to more alarms and more noise.

Webinar and eBook: The Dark Side of EDR. Are You Prepared?
2021-11-23 23:54

Whether you're evaluating an EDR for the first time or looking to replace your EDR, as an information security professional, you need to be aware of the gaps prior already to implementation so you can best prepare how to close the gaps. It's important to understand that each company is unique, and an EDR that a large company uses might not necessarily be the technology that works best when you are leading a small security team, even if you're within the same industry vertical.

On-Demand Webinar: Into the Cryptoverse
2021-11-17 02:48

A new webinar from XDR provider Cynet dives deeper into this dark corner to explore the intersection of cybersecurity and cryptocurrency. The first question is how, exactly, cryptocurrency creates security vulnerabilities for organizations.

Webinar: How to secure your sensitive data in Elasticsearch
2021-10-13 02:30

Is your Elasticsearch data protected from hackers and common attacks like search injections? Join data security expert and CEO of IronCore Labs Patrick Walsh on November 4th for a webinar on using application-layer encryption and encrypted search to secure the sensitive data in your search service. Learn how to protect your data in Elasticsearch from ransomware extortion, scraping, and more.

Cyber Security WEBINAR — How to Ace Your InfoSec Board Deck
2021-10-06 23:30

On the one hand, security leaders and CISOs must be able to communicate strategies clearly - instructions, incident response plans, and security policies. More so than just talking about the dollar value of a security policy security leaders need to show the importance of processes, tasks, decisions, and how threats and other security risks impact the math.