Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Protect Your Business From Data Privacy Leaks Using Automated Security Testing James Croall, Product Management Director, Synopsys Join us for a webinar on the automated source code data protection measure with James Croall, Product Management Director, Synopsys. James will discus... 4 weeks ago | 39 mins Cyber Notes Cast - Applying Zero Trust to PAM senhasegura The implementation of the Zero Trust-based security model has gained space in recent times, promoting the default approach of never trusting, and alwa... 47 mins ago | 13 mins Command and Control - a deeper look at DNS (ab)use Reuben Koh, Director, Security Technology and Strategy, APJ, Akamai DNS traffic is a highway of information, which can include many aspects of a modern attack, including Command-and-Control (C2) traffic, multi-staged a... 2 days ago | 58 mins Cyber Outlook 2023: Practical tips for tackling the year ahead Yvette Lejins, CISO, Proofpoint | Jennifer Cheng, Cybersecurity strategy, APJ | Sean Callaghan, Solutions Engineering ANZ Cyber-attacks pummelled organisations across the region in 2022. In APAC alone we saw large Australian organisations suffer from major data breaches, ... March 30, 2023 3:00am Optimize the implementation of PCI-DSS v4.0 on endpoint security Ralph Villanueva, IT Security and Compliance Analyst | Hilton Grand Vacations PCI Data Security Standard is a global standard for protecting account data. The latest version PCI-DSS v4.0 was finalized last year. This new standar... April 5, 2023 9:00pm Building a Modern Exposure Management Program Paul Giorgi, Director of Sales Engineering North America This session provides a comprehensive overview of the evolution of vulnerability management and explains why critical vulnerabilities do not necessari... 3 days ago | 40 mins Cyber Notes Cast - Zero Trust-Based Security Approaches senhasegura In a world of complex cybersecurity threats and mobile workforces armed with multiple apps and devices, security in Zero Trust aims to provide compreh... April 6, 2023 3:00pm Eliminate Unnecessary IT Risk with 9 Real-World Recommendations Angie Redfern, Director of Enterprise Risk and Issue Management, ServiceNow As IT Risk Managers we are all experiencing about some common challenges: managing vendors, digital transformation creating new risks, keeping up with... 1 week ago | 56 mins Cyber Notes Cast - How to Prevent DDoS Attacks in Your Company senhasegura There are several methods by which malicious agents attack websites and destabilize network services and resources. One of the most widely used techni... April 4, 2023 3:00pm Threat Alert: New Babuk Ransomware Discovered Nadav Lorber, Security Research Team Lead Morphisec has discovered a brand-new variant of Babuk ransomware. The new variant uses the Babuk ransomware source code leaked on Russian language hac... 2 weeks ago | 29 mins Load more