Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Top Threats to the Cloud for the Business John Yeoh, Global Vice President of Research | Cloud Security Alliance The cloud landscape is complex with different threats, risks, and vulnerabilities that can overwhelm a business and its security teams. An annual repo... 2 months ago | 42 mins SC Magazine Webcast: The Key to Malware Credential Theft Explosion Joshua Bartolomie Director, Research and Development Cofense,, Stephen Lawton, SC Magazine Editor and Chief Unfortunately, the users expect and assume that the first, second, and third lines of defense – the company’s security technology – has already stoppe... 4 years ago | 31 mins SC Magazine: Know Your Ransomware Enemy Stephen Lawton, SC Magazine Editor; Brendan Griffin, Threat Intelligence Manager, PhishMe It should come as no surprise to anyone that ransomware has become the hackers’ favored option these days. If you buy in to the scare tactics about ra... 5 years ago | 32 mins (ISC)² Info Session: CISSP - The World's Premier Cybersecurity Certification Tony Vizza, CISSP, CCSP, Director of Advocacy, (ISC)² Become the strongest link in your organization and accelerate your cybersecurity career with the CISSP certification in 2022! The CISSP is the global... 12 months ago | 69 mins Myths & Realities of Multi-factor Authentication: The CISO Perspective Stephen Lawton, Special Projects Editor, SC Magazine, Alvaro Hoyos, CISO, OneLogin Passwords alone won’t cut it in the days of sophisticated phishing, spoofed email and social engineering attacks. High-profile security breaches are m... 5 years ago | 33 mins DNS Security: How to Protect Your Internet Presence Paul Asadoorian - Founder and CEO of Security Weekly, Adrian Sanabria - Author and ethical hacker at Security Weekly The Domain Name System (DNS) was built in the early 1980s to solve the issues posed by the early Internet, specifically dynamic name to address transl... 1 year ago | 64 mins Myths & Realities of Multi-factor Authentication: The CISO Perspective Stephen Lawton, Special Projects Editor, SC Magazine, Alvaro Hoyos, CISO, OneLogin Passwords alone won’t cut it in the days of sophisticated phishing, spoofed email and social engineering attacks. High-profile security breaches are m... 4 years ago | 33 mins Why Do We Victim Shame? The Post-Breach Finger Pointing Phenomenon Jill Aitoro, EIC ,SC Magazine; Erik von Geldern, CISO, FXCM; Spencer Wilcox, Chief Security Officer; Brandon Dunlap, Mod It plays out over and over after a major cybersecurity breach makes headlines. Questions are asked: Why was the victim organization vulnerable? Could ... 2 years ago | 60 mins Phishy Business: Actors, tabletop exercises, and insider threats Lisa Foret, Laura Barnes In this episode of Phishy Business, we take a look at cyber crisis exercises and insider threats. Our special guest is Lisa Forte, an expert on runnin... 6 months ago | 31 mins (ISC)² Info Session: CISSP - The World's Premier Cybersecurity Certification Tony Vizza, CISSP, CCSP, Director of Advocacy, (ISC)² Become the strongest link in your organization and accelerate your cybersecurity career with the CISSP certification in 2022! The CISSP is the global... 12 months ago | 69 mins Load more