You searched for cyber | Page 12 of 14 | SC Media

Your search for cyber returned 132 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

WebCast remove

Your search for cyber returned 132 results

Sort Results:

Relevant Recent
WebCast

New methods for protecting front-line devices

New methods for protecting front-line devices NOVEMBER 18 & 19, 2020 As front line devices in network security, unprotected endpoints are primary targets for threat actors. Because they’re directly connected to the Internet, malicious hackers can easily leverage search engines like Shodan, which helps them locate any Internet-connected device, to pinpoint which are unprotected. Compounding the problem, far too many security leaders have bolstered their security arsenal with technological bells and whistles that result in endpoint complexity. Endpoint security is all about remediating vulnerabilities in devices, but more importantly, having an incident response plan in place when the inevitable breach occurs.
WebCast

Building a Better Identity Management Roadmap

The way organizations operate and process information has drastically changed over the last six months as the global economic and health crisis has resulted in job losses, an expanded remote workforce, and increased use of temporary staff. One important byproduct of this shift: Security leaders are rethinking their approaches to access control. Even in the best of circumstances, ensuring effective oversight of digital identities is among a security leader’s most daunting responsibilities. Innovations in contextual and biometric authentication remain promising — though the latter must confront increased social and legal resistance — but the growing complexity of internal and external networks we rely on keeps the bar high.
WebCast

Hacking your organization: 7 steps bad guys use to take total control of your network

The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.
WebCast

Shifting security right: Know what you own

There are a number of reasons unknown or unlogged web applications continue to live in portfolios- including M&A activity resulting in acquired web assets, and the proliferation of the digital landscape with marketing promotional sites. Ultimately, the very thing meant to draw attention to your brand and boost your bottom line is the same target attackers go after to infiltrate your organization.
WebCast

Is your incident response plan what it needs to be?

Join us August 19-20 to hear from incident-response experts and network with other security professionals who can share real-world experiences on what’s worked and what hasn’t. With cyber threats continuously looming, there is a good chance you’ll have an incident to respond to in your future. Taking a proactive stance is essential. Register today.