Cybercast
Since privileged access is usually the last link in the cyber kill chain, Privileged Access Management (PAM) has evolved in importance from simple password management to an essential cyber risk reduction imperative.
Now is the time to redefine what it means to have a mature PAM program in today’s multi-cloud world. Nearly half of all data...
More info Cybercast
Even cybersecurity pros struggle to address the unique challenges of Kubernetes and container security. It can be disorienting to take a career full of knowledge in more traditional platforms and apply it to the leading edge of declarative infrastructure and microservices. This webcast is designed to help security teams get over the initial cultur...
More info Cybercast
Cyber threats are costing businesses more than you even realize.
In a recent survey of 3,000 security and IT leaders, 55% of respondents said that dealing with cyberthreats has negatively impacted their IT team’s work on other projects, while 64% said that efforts to combat the latest threats were taking away valuable time and resources from mo...
More info Cybercast
Getting AppSec Right: Traceability and Security from Code to Cloud Organizations want to deliver secure applications quickly, but rapidly changing and increasingly complex development environments make it difficult to find, prioritize and fix application vulnerabilities. Further, when AppSec teams discover security issues, they lack e...
More info Cybercast
The Managed Detection and Response (MDR) market is heating up as lean security teams lacking the human and financial resources of larger organizations clamor for tools to uncover and stop cyber intrusions more quickly. They understand that when a bad actor penetrates their organization, every second counts. Many have learned this lesson the hard w...
More info Cybercast
In the face of rising cybersecurity threats, cyber readiness continues to be an urgent matter for every organization. But how do you achieve it? Cyber readiness ultimately involves answering three different questions, each related to a different aspect of cybersecurity. These questions are:
(Network understanding) What is the state...
More info Cybercast
Developing applications and web experiences that meet the needs of the modern user is a robust challenge for any organization. Join Fastly’s Travis Sanders, Principal Global Technology Solution Architect, in his discussion of the value of one unified platform for application and website innovation. During this webinar, Travis and Brock will highli...
More info Cybercast
As adoption of software-as-a-service (SaaS) applications skyrockets, cybercriminals understand that the cloud has become a go-to vector for them to illegally access and compromise your data.
Through phishing scams, exploits and abuse of misconfigurations, adversaries can steal, modify, encrypt or wipe your valuable SaaS-based assets – resulting...
More info Cybercast
Join this webcast to learn about the findings from the 2023 State of Passwordless Security report and how you can use it to improve your organization’s security posture.
CRA VP of Content Strategy Bill Brenner, Bojan Simic, HYPR’s Co-founder, CEO and CTO and Andrew Shikiar, Executive Director & CMO, FIDO Alliance discuss key tak...
More info Cybercast
The ultimate goal of User Access Reviews is to reduce security risk by ensuring that all access within an organization is appropriate and limited to legitimate current use cases. But, as Snowflake grows in terms of employees and systems, performing these reviews quarterly can become time-consuming, cumbersome, and error-prone in the absence of aut...
More info Cybercast
There’s a lot of advice out there for how to secure the hardware, firmware and software that encompasses your company’s digital supply chain. But not all of it is immediately feasible for everyone, especially for organizations that are limited in resources or lacking security maturity. Fortunately, this webcast will make sense of this c...
More info Cybercast
Cybersecurity is a pressing issue for public-sector organizations in the US, as they face the challenge of sorting through a vast amount of cyber threat intelligence while operating with limited resources and a shortage of skilled infosec professionals. The consequences of a successful attack can be devastating, highlighting the importance of prio...
More info Cybercast
Generative AI tools such as GitHub Copilot and ChatGPT seem to hold promise for developers looking to write code more efficiently and find quick answers to programming questions. But especially in these early days, carefree reliance on such tools can introduce a range of issues related to software functionality, licensing, and security. Superficia...
More info Democast
One of the most preventable causes of malicious exploits that result in damaging breaches or malware attacks is the failure to update known software vulnerabilities. Ideally, your organization is vigilant enough to patch these flaws as soon as they are publicly divulged. But if one does slip through the cracks and becomes exploited, you at least w...
More info Cybercast
How IT risk translates into enterprise risk, and how we tie the two together.
What is IT risk? How has the definition shifted over the years as it relates to overall enterprise risk?What are key drivers of IT risk on a business today?How do you quantify and communicate IT risk in a tangible way? Why IT should be seen as an enabler, rather...
More info Cybercast
The latest snapshot of your network traffic logs may look innocent enough, but hidden amongst your daily activity are the movements of a cybercriminal adversary who has secretly breached your systems and is now trying to expand its foothold within your virtual walls in multi-cloud environments.
It’s this east-west infiltration that turns ...
More info Cybercast
The cost of cyber insurance is skyrocketing. In response to a string of high-profile attacks, record-setting ransomware numbers and government regulations, insurers are being forced to significantly increase premiums for cyber coverage. Meanwhile, it’s getting even harder for companies to qualify for coverage in the first place, as cyber insurance...
More info Cybercast
Despite their unavoidable flaws, most organizations still require both employees and customers to use passwords. Yet passwordless solutions are both demonstrably more secure and readily available. The question for organizations looking to ditch passwords: Where to begin? This SC Media webcast with HYPR’s Michael Rothschild will address the path to...
More info Cybercast
Identity authentication is a critical tool in the fight against fraud, especially as malicious attackers steal consumer credentials in an attempt to take over their online accounts. But it’s also important to ensure that having these safeguards in place doesn’t negatively downgrade the customer experience or violate an individual’s privacy. Otherw...
More info Cybercast
The threat landscape seems to be moving at such an accelerated pace these days. The constantly moving targets and ever-expanding threat landscape is a reality that we as leaders need to not only deal with but find ways to get out ahead of. Today and from our time in the field, we want to impart some practical ways that we have seen work to help o...
More info Cybercast
Every year brings new challenges in protecting our companies and nations from threat actors. Join our live conversation with key CISOs as we look back at 2022 and review some of the key learnings, and look ahead with a laser focus on 2023 priorities for cybersecurity.
Speakers:
Todd FitzgeraldVP, Cybersecurity StrategyCybersecurity Co...
More info Cybercast
We’ve heard it before: Achieving minimal compliance with security standards or frameworks isn’t enough to protect yourself from today’s threats. Basic compliance needs to be a starting point – a core building block upon which you must continually improve and scale your security processes.
With limited resources, staffing, and funding inhibiting...
More info Cybercast
The traditional security monitoring architecture has been troubling security teams with data silos, performance issues, and delays in retrieving archived data for years. Many analysts who continue to operate with the antiquated SIEM architecture stack also experience a high volume of alerts—with many false positives. Luckily, the internal security...
More info Cybercast
Today, successful fraud attempts outnumber those stopped, causing security and risk experts to wonder: How can we turn the tide? The answer lies in machine learning (ML) and artificial intelligence (AI) technologies, which ingest and understand vast historical data to identify fraudulent patterns and suspicious transactions. This webcast...
More info Democast
Organizations have more security concerns than ever before (due to an increasingly volatile threat landscape, growing attack surfaces, and increased volume and complexity of security threats and alerts) and security operations will continue to be difficult for many organizations to effectively combat without the right combination of technology, in...
More info Cybercast
Bots are pesky, ill-natured, and often spiteful programs. Their capabilities constantly evolve in order to elude online defenses and take over consumer accounts. Advanced bot operations use malicious plug-ins, bot farms, and artificial intelligence to bypass and solve traditional CAPTCHA mechanisms. Ironically, traditional CAPTCHAs are often more ...
More info Democast
Secure application development can be a painstaking process, but just how painful does DevSecOps actually need to be?
Companies that are actively engaged in DevSecOps speak of multiple pain points, from struggles with asset visibility and discovery to finding ways to close every gap in their defenses. Along the way, they face an uphill battle t...
More info Cybercast
CISOs are the most sophisticated buyer in the technology industry. Successful engagement with these executives requires a nuanced communication strategy that blends technology, strategic, and leadership content. Above all, solution providers must establish themselves as trusted partners whose primary mission is the safety and security of their cus...
More info Cybercast
New analysis from VMware delves deep into the most recent waves of the Emotet botnet, providing never-before-seen insights into the malware delivery mechanism’s malicious components and modules, its execution chains and its software development lifecycle. This webcast will reveal key findings and takeaways from VMware’s researchers, who mana...
More info Cybercast
The growing number of cloud-based SaaS applications that employees are using to conduct their day-to-day business is dramatically expanding their companies’ attack surface. And malicious actors are increasingly infiltrating networks by compromising weak credentials used across various cloud applications.
The initial knee-jerk reaction among sec...
More info Cybercast
A new Global Incident Response Threat Report from VMware has identified five burgeoning trends that cybersecurity leaders and professionals must get ahead of, if they wish to keep their heads above water:
Deepfakes are becoming mainstream cybercriminal toolsBurnout rates among cyber professionals remain high Ransomware extortion tactics ar...
More info Cybercast
The API attack surface grows larger and more complex every day – leaving organizations uncertain of how to navigate this unfamiliar and dangerous territory. Such confusion leaves businesses vulnerable to botnet attacks against APIs that could result in a denial-of-service scenario or user account takeover.
The first step toward fixing this prob...
More info Cybercast
The cloud has turned security as we know it on its head. It looks and operates differently from the familiar data center, and traditional security practices don’t fully cover the cloud. The cloud attack surface is different as well, and so are the patterns used when cloud environments are attacked. Working closely with cloud security and engi...
More info Cybercast
What makes a Privileged Access Management (PAM) solution truly comprehensive, end-to-end, and modernized? Without truly understanding how to harness the power of PAM, organizations could leave themselves open to attacks on assets that typically require special user access.
This webcast will examine the key moving parts of PAM, including vaultin...
More info Cybercast
Today’s hybrid workforces have introduced additional security risks to their employers. Whether working from home or while traveling, employees need the same quality of protection and control as when they are on site. Consequently, organizations must ensure a consistent employee experience when connecting to the network and accessing key assets.
...
More info Democast
Cloud native development has changed the way developers both build and secure applications. It’s more important than ever for apps to remain secure through their entire development lifecycle – but without impacting dev teams’ ability to innovate with efficiency. One way to balance these needs is to approach security from a dev point of view.
Th...
More info Democast
In 2018, Palo Alto CTO Nir Zuk coined the term XDR – extended detection and response. Since then, the market for this security toolset – designed to unify, correlate and prioritize threat information gathered across all network data points – has taken on a life of its own. Now, organizations are hungry to know if XDR is the right approach for them...
More info Cybercast
Security assessment questionnaires are no longer the centerpiece of third-party risk management programs. As our third-party ecosystems become more diverse and dynamic, so too should our way of monitoring and collaborating with these critical business partners.Join Caitlin Gruenberg, Director of Solution Engineering at CyberGRX as she takes us thr...
More info Cybercast
Look inside most business organizations and you’ll find that their endpoint environments have become increasingly complex, divergent and fragmented – with a proliferation of workstations, mobile and IoT devices, containers, servers, cloud platforms and virtual machines. And remote workforce policies are only accelerating this trend. So imagin...
More info Cybercast
Supply chain-based cyberattacks are one of the biggest threats facing companies in 2022. What decisions would you make if you were the software development company whose third-party library had been targeted, potentially impacting its entire downstream customer supply chain?
In this interactive webinar, you will take on the role of a CISO at a ...
More info Cybercast
Your IT department and security department may both work for the same company, but due to opposing objectives, they don’t always act like they’re on the same team. Each unit has its own priorities, and its own set of point solutions for managing endpoints. This can lead to dangerous silos developing within the walls of your organization, res...
More info Cybercast
Cyberattacks make the news practically every day. But some headlines – like the SolarWinds incident and the ProxyShell and Log4Shell exploits – have global, far-reaching consequences that can affect many downstream organizations. It’s enough to trigger panic in your CEO and board, who may be asking, “How does this affect us?” And the reality is, s...
More info Cybercast
Organizations are facing sophisticated and well-funded adversaries with targeted penetration strategies, including supply chain attacks. Despite multi-layered security investments, these threat actors are successfully breaching defenses and going after organizations’ data. That’s why data security is your last – and most important – line of defens...
More info Cybercast
As more organizations adopt multi-cloud strategies, security managers must develop a strategy to consistently protect web applications across hybrid environments, while preserving quality of security and operational efficiency. The traditional approach to application security no longer works in the multi-cloud, and anew approach is needed. Join us...
More info Cybercast
When it comes to developing strong security hygiene habits, it’s easy to talk a big game. But consistently executing on these practices is another ballgame entirely. Even the simplest of tasks can become unwieldly as a company’s IT assets scale in size. Nevertheless, businesses can take significant strides in bolstering their cyber hygiene against...
More info Democast
Timely threat detection is essential. Every second that a malicious actor lingers inside your network, the odds increase that your organization could be the victim of a major malware attack. Nation-state APT actors are especially adept at staying hidden – but if you know what TTPs and IOCs to look for and you have comprehensive visibility into the...
More info Cybercast
The SolarWinds and Kaseya attacks. Log4Shell and ProxyShell… These are the headlines that give security professionals nightmares. To survive the dizzying pace of today’s modern threat landscape, organizations must have in place an action plan that allows them to quickly triage security incidents, with the confidence that they’re responding t...
More info Cybercast
Security practitioners have many different initiatives demanding their time: evaluating and mitigating 3rd party risk, enabling strategic business efforts, implementing zero-trust practices, and supporting compliance activities, to name just a few. Often overlooked in these initiatives is a security gap that is critical to close if any of these in...
More info Cybercast
You’ve completed a pen test and, not surprisingly, the offensive security exercise turned up multiple weak points and exploitable vulnerabilities across your enterprise environment.
Now what? How do you do ensure your pen test results are actionable and that you get the support from leadership to act on the findings? How do you assess the...
More info Cybercast
The average dwell time of a network intrusion lasts an average of 197 days before discovery, according to a Ponemon Institute study. During that window, there are key moments where the attackers take an action that might alert you to their presence. If you notice it, then you can mitigate the attack before it’s too late. But uncovering these indic...
More info