webinar
REGISTER TO LEARN ABOUT CYBERSECURITY WORKFORCE STUDY IN CIS WEBINAR
This post was originally published by (ISC)² Management. This is one you won’t want to miss. (ISC)² Director of Cybersecurity Advocacy, John McCumber, will walk through the 2019 Cybersecurity Workforce Study results in a webinar hosted by the Center for Internet Security this Wednesday, February 12 at 12:30 p.m. ET. Read more here:https://blog.isc2.org/isc2_blog/2020/02/register-to-learn-about-cybersecurity-workforce-study-in-cis-webinar.html Photo: thesiliconreview.com
Join the Webinar ‘Access Rights Management – The Secret to Preventing Insider Attacks and Data Breaches’
You are invited to the upcoming security webinar “Access Rights Management – The Secret to Preventing Insider Attacks and Data Breaches“, live on May 21 [ register here ]. Providing secure access to users is a huge hurdle for IT teams. Effective solutions must be able to address dynamic and diverse user requirements, secure the […]
Nyotron Webinar: Live Hacking Using Russia’s Favorite TTPs
U.S. Director of National Intelligence Dan Coats says the country’s digital infrastructure is under constant attack by state-sponsored cyber attackers from Russia, China, Iran and North Korea. He even compares the situation today to the months before September 11, 2001, adding “here we are nearly two decades later, and the warning lights are blinking red again.” Why […]
Webinar: How to overcome challenges when securing modern cloud environments
This post was originally published here by casey pechan. Our latest webinar, How to overcome challenges in securing modern cloud environments, dives into how you can cope with new security challenges that you may be re-assessing as you examine your security posture and strategy. And here’s why: As more workloads shift to the cloud, cybersecurity professionals […]
Webinar: integrating security into your CI pipeline
This post was originally published here by casey pechan. Our latest webinar Integrating security into our CI pipeline, examines how containers and image vulnerability assessment can be integrated into your DevSecOps tools and processes. After all, one of the biggest challenges of adopting containerization is fast and effective vulnerability management. And the only way to […]
Care Analytics partner webinar: CloudPassage security and compliance
This post was originally published here by casey pechan. Not only is Care Analytics a valued partner of ours, but they provide excellent cloud computing for the healthcare industry. In their latest webinar: Featured partner, CloudPassage security and compliance, we sat down with some of their team to demo and discuss our platform CloudPassage Halo, which Care Analytics […]
Five tips for securing Docker containers webinar now available for viewing!
This post was originally published here by casey pechan. Last month we debuted a webinar that answered all of your burning containerization security questions: 5 tips to securing Docker containers. In this webinar we broke down the architectural differences with containers and some of the best practices for securing them. In particular, we discussed how security […]
Webinar: A crash course in designing a security architecture for your containerized applications
This post was originally published here by casey pechan. This month we released our final webinar of the year, and boy did we finish with a bang! Our VP of Product Management, Amit Gupta led this webinar and demonstrated how best to design security architecture for your containerized applications. As you likely know, containerization has been […]
Webinar: How to fearlessly embrace agility in IT security
This post was originally published here by casey pechan. Last week we partnered with the Argyle Security Forum to bring together leading IT security executives for our latest webinar, the 2017 CISO virtual event: how to fearlessly embrace agility in IT security. For those of you who didn’t catch last week’s webinar, not to worry you can view […]
Learn all about automated compliance in our latest webinar
This post was originally published here by casey pechan. At this point, nearly every organization is held to some sort of compliance standard. Where there are customers, there are security specialists working on protecting their data in order to stay within compliance. And while most organizations agree that it’s best to automate and streamline business […]