Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cyber Notes Cast - How to Manage Privileges in Endpoints? senhasegura If you are running an organization, you should be concerned with managing endpoint privileges to ensure devices such as laptops, smartphones, and tabl... March 22, 2023 3:00pm Can regulation prevent greenwashing? Nik Pratt, Renato Coelho, Thomas Willman, Maria Lozovik, Daisy Streatfeild Sustainability regulations are on the rise, all in an effort to manage capital flows toward sustainable investments, but the question remains, are the... 2 months ago | 52 mins Q4 & year-end 2022 - ABN AMRO Boston Common US Sustainable Equities Geeta Aiyer, CFA Quarter & year-end update: market overview and portfolio review 2 months ago | 38 mins Cyber Notes Cast - HIPAA Five Tips for Complying with The Certificate senhasegura What is HIPAA? Currently, this is one of the most frequently asked questions by many professionals working in the healthcare industry, especially in t... 2 weeks ago | 7 mins Cyber Notes Cast - Cybersecurity Health What it is and how to comply with HIPAA senhasegura Infrastructure security breaches damage healthcare organizations. A vulnerability in a hospital’s cybersecurity network could expose sensitive patient... 2 weeks ago | 15 mins Cyber Notes Cast - Overview of Texas data privacy laws senhasegura Texas is one of the richest states in the USA and has been receiving a large amount of tech companies in recent years: Oracle, Cloudflare, and Tesla ... 2 weeks ago | 6 mins Cyber Notes Cast - Credential Management a bunker for Code War senhasegura When asked, Thomas Waite - author of the book Lethal Code - “Why did he decide to write cyber thrillers?”, his answer was: “Because we've gone from th... 2 weeks ago | 14 mins Cyber Notes Cast - Why is Data the New Oil? senhasegura With the evolution of technology, the consumer can make purchases faster and more practical, receive optimized ads – which help a lot when purchasing ... 2 weeks ago | 7 mins Cyber Notes Cast - Manage Privileged Access - Like a PRO senhasegura Cyberattackers explore several privileged credentials scattered throughout the infrastructure as an intrusion vector. According to Verizon, in its 202... 2 weeks ago | 8 mins Cyber Notes Cast - Machine Identity Management Best Practices senhasegura Remote work and the adoption of cloud computing surfaced the concept of identity as a perimeter. In this sense, although it is not new, identity secur... 2 weeks ago | 16 mins Load more