You searched for cyber | SC Media

Your search for cyber returned 8 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

WebCast remove
Last 30 days remove

Your search for cyber returned 8 results

Sort Results:

Relevant Recent
WebCast

Cybersecurity Strength in Numbers with Security Partners

Many cybersecurity teams struggle with overly complex and siloed toolsets. Powerful endpoint security technology combined with proven process and security expertise across endpoint, network, and cloud, is a winning formula to help you more effectively and efficiently identify and respond to cyber threats. Rather than build, maintain, and scale a security operations center alone, teaming up with trusted security partners gives you strength in numbers.
WebCast

Deconstructing the CRAE Index and What it Means to You

If you’d like to know what security pros are investing in and their insights into what’s working for them, our experts can help. The inaugural Cybersecurity Resource Allocation & Efficacy Index study from CyberRisk Alliance Business Intelligence, underwritten by Pulse Secure, launched last quarter and is about to be refreshed for the third quarter of 2020. It offers CISOs valuable information from companies, with 500 or more employees, in North America and Europe.
WebCast

Improve vulnerability and patch management strategies

Improve vulnerability and patch management strategies DECEMBER 16-17, 2020 Threat actors are known to take the path of least resistance when it comes to compromising organizations. This is why cybercriminals often focus on unpatched software vulnerabilities. For years, this has been a major issue for many organizations, and it continues to be the case. It’s no longer acceptable for vulnerability management to be given a comfortable routine approach.
WebCast

Prevent, detect and respond to ransomware

Prevent, detect and respond to ransomware DECEMBER 2 & 3, 2020 10:30 am – 4:00 pm EDT WannaCry put security leaders on notice when it comes to ransomware. Since then, attacks have skyrocketed, with the FBI reporting that businesses and individuals lost billions of dollars, due to cybercriminals’ use of malicious software. This remote, digital shakedown has quickly become the preferred method for many digital marauders to prey on all kinds of organizations.
WebCast

Closing security gaps in hybrid and multi-cloud environments

Digital transformation initiatives have led many companies and organizations to adopt cloud services. While this has boosted operational agility and unlocked new revenue sources, it has left information security teams with multiple new environments to secure, test and monitor. Especially for those who work in hybrid or multi-cloud environments, understanding your organization’s cloud attack surface requires new thinking and may even demand a security overhaul. To be sure, achieving absolute visibility is always difficult, but innovative approaches, and new combinations of techniques and tools, are proving effective for organizations whose network extensions have left them outside their comfort zone.
WebCast

Malware is constantly evolving – Are you?

Though malware has continued to evolve, its delivery mechanism has remained a constant: According to the 2019 Verizon Data Breach Investigations Report, 94 percent of malware was delivered by email. In recent years, the explosion in ransomware attacks has rightly taken center stage when it comes to malware analysis. Evaluating the more than half a million instances reported in 2019, security firm Emsisoft estimates an aggregate ransom demand exposure of more than $6.3 billion.
WebCast

APTs expanding reach: Understanding the risk of persistent threats

APTs expanding reach: Understanding the risk of persistent threats January 26 & 27, 2021 Many — perhaps most — security professionals do not build their threat models around cyberespionage, but that approach is changing. Yes, state-sponsored hackers tend to go after bigger fish, but hackers-for-hire are leveraging the same tactics once used by state-sponsored APT groups to target smaller companies — especially as more small organizations increase their operations’ digital reach. Other bad actors treat small and mid-sized companies as points-of-access to get to larger targets they may do business with.
WebCast

New methods for protecting front-line devices

New methods for protecting front-line devices NOVEMBER 18 & 19, 2020 As front line devices in network security, unprotected endpoints are primary targets for threat actors. Because they’re directly connected to the Internet, malicious hackers can easily leverage search engines like Shodan, which helps them locate any Internet-connected device, to pinpoint which are unprotected. Compounding the problem, far too many security leaders have bolstered their security arsenal with technological bells and whistles that result in endpoint complexity. Endpoint security is all about remediating vulnerabilities in devices, but more importantly, having an incident response plan in place when the inevitable breach occurs.