You searched for cyber | Page 14 of 15 | SC Media

Your search for cyber returned 144 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

WebCast remove

Your search for cyber returned 144 results

Sort Results:

Relevant Recent
WebCast

Is your incident response plan what it needs to be?

Join us August 19-20 to hear from incident-response experts and network with other security professionals who can share real-world experiences on what’s worked and what hasn’t. With cyber threats continuously looming, there is a good chance you’ll have an incident to respond to in your future. Taking a proactive stance is essential. Register today.
WebCast

Design Thinking for Zero Trust

Security happens where man meets machine (or fails to happen, as we see all too often!) As organizations have shifted from local-only to hybrid and cloud-hosted resources, the principles of zero-trust security have helped define human-friendly secure access regardless of a user’s location. With this in mind, it becomes crucial to ask the right questions: what exactly happens where people and technology meet?
WebCast

Unlock SASE success with security efficacy and performance

The global pandemic has accelerated the move of edge security controls to a cloud-delivered model. But it hasn’t changed our needs for effective threat detection and reliable, fast secure access. The best way for security teams to meet these new challenges head-on is through a secure access service edge (SASE) service.
WebCast

New methods for protecting front-line devices

As front line devices in network security, unprotected endpoints are primary targets for threat actors. Because they’re directly connected to the Internet, malicious hackers can easily leverage search engines like Shodan, which helps them locate any Internet-connected device, to pinpoint which are unprotected. Compounding the problem, far too many security leaders have bolstered their security arsenal with technological bells and whistles that result in endpoint complexity. Endpoint security is all about remediating vulnerabilities in devices, but more importantly, having an incident response plan in place when the inevitable breach occurs.