Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date IT, Spies, and Nation States: 5 Ways to Stop Insider Threats in Government Shunta Saunders A major embarrassment, at best, and a national security threat at worst. The case of a 21-year-old Air National Guardsman charged with leaking top-sec... June 20, 2023 3:00pm Bot Management Masterclass: 5 Key Principles to Win Against Bots David Senecal, VP of Architecture & Research at Arkose Labs Despite the myriad of bot prevention solutions and investments businesses are making to tackle this growing (and evolving) problem, we are far from wi... June 6, 2023 3:00pm Cyber Insurance - Mitigating Risk in a World Without 'Perfect' Cybersecurity Mark Millender, Senior Global Value Engineering Advisor at Tanium Organizations worldwide will lose $8 trillion to cybercrime this year, rising to $10.5 trillion by 2025. How much of that will come from your workplac... June 7, 2023 3:00pm Securing The Fort: How to master cyber incident response in a large company Konstantin Sapronov, Head of Global Emergency Response Team at Kaspersky In large companies, the sheer volume of information resources makes their attack surface significantly larger, compared to smaller businesses. Numerou... June 15, 2023 2:00pm How to Build an Effective Cybersecurity Governance Framework Matthew Bianchi Good cybersecurity governance is more important than ever before with new mandates from the SEC on cybersecurity risk management and the increasing em... June 14, 2023 5:00pm How a Risk-based XDR Approach Improves Threat Detection and Response Jon Oltsik, Analyst and Fellow with Enterprise Strategy Group and Briana Farro, Director, XDR Product Management with Cisco Existing threat detection and response technologies are not as effective as they need to be for today’s security landscape. This unfortunate reality i... 2 weeks ago | 48 mins Open-Source Malware: An Evolving Landscape & Technical Analysis Hido Cohen, Cyber Security Researcher and Michael Gorelik, CTO Morphisec Threat Labs researchers have seen an uptick in attack campaigns using open-source malware. As software development open-source communities g... June 13, 2023 3:00pm Are SIEM Solutions enough? Ryan Alban, Senior Manager of Global Solution Leads - George Anderson, Senior Manager of Product Marketing Choose the right SecOps platform to spend and defend effectively. What You’ll Learn: • The differences between SIEM and XDR and how they both impact... 3 weeks ago | 64 mins Why DNS Security is a Necessary Line of Defense Howard Holton, CTO & Analyst at GigaOm; Sam Kumarsamy & Jonathan Barnett at OpenText Cybersecurity It is easy to overlook DNS security as a priority, but a vulnerable DNS leaves your organization susceptible to risk. Adopting DNS protection allows y... 2 weeks ago | 60 mins How to Supercharge your CMDB and Realize Value Sooner Mike Mahoney, Sr. Director, Partner Marketing, Technology Alliances at Tanium Your Configuration Management Database (CMDB) should be the single source of truth to power effective processes and decision-making across your IT org... 4 days ago | 26 mins Load more