Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cybersecurity Lesson from the Death Star: CIS Control 4 Explained in 45 Minutes Dirk Schrader, VP of Security Research at Netwrix, Mark Kedgley, CTO at Netwrix The Center for Internet Security (CIS) is a top resource for cybersecurity best practices. One of its recommended security controls, Control 4, should... 2 hours ago | 59 mins Introduction to cybersecurity with Ubuntu Pro on Azure Government Chris Huffman - VP of Public Sector, James HiIliard - Chief Architect, David Anstine - Cloud Solution Architect US government agencies and organizations in government-regulated industries face a huge challenge in complying with regulations and standards in order... 2 days ago | 41 mins System Hardening: Defending Against Common Malware Tools and LOL Techniques Dirk Schrader, CISSP, CISM, ISO27001 Practitioner at NNT, Now part of Netwrix Malicious actors are always eagerly looking for vulnerabilities in your IT systems that they can exploit to steal your valuable data, disrupt your bus... 4 months ago | 44 mins System Hardening: Defending Against Common Malware Tools and LOL Techniques Dirk Schrader, CISSP, CISM, ISO27001 Practitioner at NNT, Now part of Netwrix Malicious actors are always eagerly looking for vulnerabilities in your IT systems that they can exploit to steal your valuable data, disrupt your bus... 4 months ago | 44 mins System Hardening: Defending Against Common Malware Tools and LOL Techniques Dirk Schrader, CISSP, CISM, ISO27001 Practitioner at NNT, Now part of Netwrix Malicious actors are always eagerly looking for vulnerabilities in your IT systems that they can exploit to steal your valuable data, disrupt your bus... 4 months ago | 44 mins Cybersecurity Lesson from the Death Star: CIS Control 4 Explained in 45 Minutes Mark Kedgley, Chief Technology Officer & Dirk Schrader, CISSP, CISM, ISO27001 Practitioner with NNT (now part of Netwrix) The Center for Internet Security (CIS) is a top resource for cybersecurity best practices. One of its recommended security controls, Control 4, should... 4 weeks ago | 58 mins Backup - Cybersecurity's last line of defense Doug Chando - Solutions Architect & Jason Cray - Converged Infrastructure and Storage Architect for Sirius Computer Solutions Your organization’s most valuable asset - its data - is under constant assault. Threats like malware, breaches, phishing, ransomware, and even disgru... 2 weeks ago | 38 mins Backup - Cybersecurity's last line of defense Doug Chando - Solutions Architect & Jason Cray - Converged Infrastructure and Storage Architect for Sirius Computer Solutions Your organization’s most valuable asset - its data - is under constant assault. Threats like malware, breaches, phishing, ransomware, and even disgru... 3 weeks ago | 38 mins DISA STIG auditing and remediation in air-gapped environment Massimiliano Gori, Product Manager; Henry Coggill, Product Manager; Chris Huffman, VP Public Sector; Compliance with DoD Security Technical Implementation Guide (STIG) is an essential requirement for all DoD agencies or any organisation that is part o... 3 months ago | 44 mins Hacking and Hardening without Perimeters Holly Grace Williams, Founder, Akimbo Core An ethical hacker’s view of the mordern corporate network. Looking through how effective different network hardening methods have been in keeping hack... 8 months ago | 45 mins Load more