December 30, 2019

Insider threats in 2020: Best practices for detection and protection

About this webinar Insider threats are arguably more dangerous than external hacks. While external hackers need to get through peripheral network devices, malicious insiders already reside […]
December 30, 2019

Incident detection and response with SIEM

About this webinar In recent years, security information and event management (SIEM) solutions have evolved far beyond the basic incident detection features they’re typically known for. From the use […]
December 30, 2019

Hardening password security across hybrid Active Directory in 2020

About this webinar Passwords — the baselines for security and the first line of defense for an organization —  may seem like a widely-known topic, but passwords are still a critical problem […]
December 17, 2019

5 cost-saving opportunities in the IT asset life cycle

The history of cybersecurity shows us that the phrase "you can never be too safe" rings all too true; with the threat of a hack occurring at anytime, being unaware of new attack strategies is one of the greatest blunders a cybersecurity professional can commit. To make their jobs a little easier, we've put together a quick guide explaining how the attacks work, how to detect them, and how to prevent three unconventional, catastrophic cyberattacks that can be dreadful.
December 12, 2019

Schedule Webinar Dec V2