You searched for cyber | Page 10 of 14 | SC Media

Your search for cyber returned 131 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

WebCast remove

Your search for cyber returned 131 results

Sort Results:

Relevant Recent
WebCast

The Future of Remote Work: Connecting Security and IT

CIOs, CISOs, and the teams they lead are constantly learning to adjust the operational and cybersecurity requirements of a remote workforce. And the stakes are high. Faced with the combined challenges of an expanding risk surface area, a disparate staff, and a complex set of tools and workflows, enterprise teams need help.
WebCast

Securing Employees’ Email

Secure email gateways are supposed to be just that — secure. Unfortunately, like many other security appliances, gateways can be fooled and compromised. The key is knowing what to look for and how to mitigate and overcome the risks related to malware getting past the gateways and into users’ mailboxes.
WebCast

Small businesses deserve big protection

Small businesses are facing many of the same cybersecurity challenges as these larger businesses: 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. In this webinar, you’ll learn more about small business cybersecurity and why DNS protection makes a difference.
WebCast

Identity Crisis: Solved?

We talk a lot about how passwords are obsolete, easy to breach, and generally just an obsolete technology that should be replaced. Yet many companies are hesitant to engage in emerging identity management technology because of the costs, the complexity of replacing one identity access management approach with another, and the challenge of layering on new IAM without breaking existing identity products — the management can be a monumental challenge.
WebCast

Managing the attack surface

We talk a lot about finding ways to defend our networks from attacks. One of the most effective defenses against cyberattacks is the same used against physical attacks: Don’t be there. Today’s 20/20 webcast looks at ways companies can manage and reduce their attack surface so that they present a smaller target to the attackers, as well as tactics defenders can use long-term to continue to present a smaller target.
WebCast

5 Ways to Mitigate Costly Software Supply Chain Attacks to Get Your SDLC in Check

Developing your digital business means developing new web and mobile applications, migrating to cloud, and evolving DevSecOps practices to accelerate time to market. Yet cyberattackers have aggressively been targeting your software supply chain, including open-source repositories, to act as malware distribution platforms. With today’s software more reliant on third-party and open-source software, your software development lifecycle (SDLC) demands more checks to validate the integrity of your build, release and production software.
WebCast

New Normal, New Risk: What Global Security Pros are Saying About the Challenges of Securing Remote Workers

The COVID-19 pandemic dramatically accelerated the growth of remote workers across all industries. As companies struggle to adjust to our new “work from anywhere” reality, security staff are caught in the crossfire. Remote teams are required for business continuity, yet these employees and their devices create an exponentially broader attack surface area, as well as significant risk to the organization.
WebCast

The Best Ways to Stop Malware and Ransomware That No One Else Will Tell You

With malware attacks on the rise, making sure you keep your organization safe from a costly breach is a top priority. The two best things you can do to stop malware and ransomware attacks are to figure out how malware is getting by your defenses and for how long. Your current antivirus vendor isn’t going to tell you the answers to either of these. But Roger Grimes, Data-Driven Defense Evangelist at KnowBe4, will.
WebCast

Building a Better Identity Management Roadmap

The way organizations operate and process information has drastically changed over the last six months as the global economic and health crisis has resulted in job losses, an expanded remote workforce, and increased use of temporary staff. One important byproduct of this shift: Security leaders are rethinking their approaches to access control. Even in the best of circumstances, ensuring effective oversight of digital identities is among a security leader’s most daunting responsibilities. Innovations in contextual and biometric authentication remain promising — though the latter must confront increased social and legal resistance — but the growing complexity of internal and external networks we rely on keeps the bar high.
WebCast

Run a secure development program

Most of your application code is open source, and you’re relying on containers for running your applications – but are you managing to keep up with security? Learn how Snyk enables developers to find, prioritize and fix vulnerabilities and license issues in open source dependencies and containers. SPEAKERS Daniel Berman Shawn Miller Bradley Barth