Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date CIS hardening benchmarks automation now available for Ubuntu 22.04 LTS Henry Coggill: Compliance PM, System hardening is an essential preventative security measure for production systems and critical workloads, especially for regulated industries such... 4 days ago | 34 mins Stopping Privilege Escalation In The Cloud With Least Privilege Alba Ferri, Senior Product Marketing Manager, Sysdig and Yathi Naik, Technical Lead Manager, Sysdig In today's world, data breaches and insider threats are becoming increasingly common, and controlling access to sensitive information is crucial for o... 3 weeks ago | 48 mins Steps to Test Your Ransomware Readiness Posture Adam Mansour, Chief Security Officer, ActZero | Jim Skidmore, Vice-President - Solutions Group, intiGROW Most cyber defense teams are unaware of how much ransomware evolves over a 24-hour period, which is part of why ransomware "is present in almost 70% o... 2 weeks ago | 60 mins CPE | Crazy Cyber Battle: Hacker vs Netwrix Brian Johnson (President of 7 Minute Security), facing off against Grant Stromsodt (Solutions Engineer at Netwrix). Earn 1.5 CPE Credits on this webinar Prepare to be captivated as Brian Johnson, a skilled white-hat hacker, embarks on a daring mission to infiltrate... June 22, 2023 5:00pm 5 Ways Access Management Goes Awry in AWS Shane Stephens, Director of Solutions Architecture, StrongDM When following best practices for secure access in the cloud, things often seem to start off so simple. Least privilege makes sense. Enforcing credent... June 28, 2023 5:00pm PAM Parity: Replacing Your Legacy Endpoint Privilege Management Solution Quickly Jeremy Moskowitz (CTO and Founder of PolicyPak, now part of Netwrix), Martin Cannard (VP of Product Strategy at Netwrix) Is your legacy tool for endpoint privilege management EOL'ing soon? Are you looking for a cost-effective replacement that provides feature parity and ... 2 months ago | 62 mins How To Use ChatGPT & AI in Multi-Cloud Security Itamar Golan, Head of Data Science — Lior Drihem, Director of Innovation — Deborah Galea, Director of Product Marketing Learn more about how AI and ChatGPT can significantly enhance cloud security remediation in multi-cloud environments and reduce the daily workloads of... 3 weeks ago | 40 mins Modern Nux Security and Least Privilege CyberArk "The MITRE ATT&CK 11.2 framework for Linux was just released, a hallmark of the expanded Linux attack surface at the hands of today’s threat actors. F... 4 months ago | 47 mins Cyber Notes Cast - How to Manage Privileges in Endpoints? senhasegura If you are running an organization, you should be concerned with managing endpoint privileges to ensure devices such as laptops, smartphones, and tabl... 2 months ago | 7 mins Cyber Notes Cast - Password Reuse Understand the Risks of this Practice senhasegura Password reuse is one of the main reasons why passwords have been questioned as an effective measure to guarantee protection against intrusion into ac... 2 weeks ago | 11 mins Load more