Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

No More Weak Links: Unleashing NDR and SASE for Hybrid Networks

The perimeter is gone. Hybrid work is here to stay. And MSPs sit at the crossroads of a network security evolution. This webinar focuses on how Network Detection and Response (NDR) and Secure Access Service Edge (SASE) are changing security delivery, showing MSPs how to lead this evolution. It will help you distinguish between hype and actionable strategies, empowering you to approach hybrid environments with a security-first mindset and evolve network security beyond traditional firewalls.

NAKIVO Backup & Replication | Fast, Affordable Data Protection

Your data is more than just data — it powers your business. But data loss can happen in seconds through hardware failure, accidental deletion or ransomware. That’s why thousands of companies worldwide trust NAKIVO Backup & Replication for: Fast, reliable backup & recovery Flexible deployment options Protection for virtual, physical, cloud & SaaS workloads Ransomware protection with immutability, encryption & malware scanning Easy-to-use centralized web interface.

Resilience by Design: How to Stay Online During Attacks and Outages

In today’s cloud-native world, resilience isn’t optional — it’s foundational. Daniele Molteni, Director, Product Management for Application Security at Cloudflare, is leading a panel at Cloudflare Connect 2025 that tackles a core question: how do you design systems to withstand attacks, outages, and failures? In this preview, Daniele shares what’s at stake when downtime hits — and how leaders are rethinking operational continuity for the modern Internet.

Detecting EDR Evasion with Corelight Open NDR

This video walks through how Corelight Open NDR helps security teams detect EDR evasion by delivering complete visibility across all network assets. Using a real-world scenario, the video demonstrates how anomaly detection uncovers suspicious activity, mapping events directly to MITRE ATT&CK techniques. The investigation process highlights the detection of an anomalous user agent, which ultimately reveals a Linux privilege escalation toolkit.

The MemcycoFM Show: Ep 17 - Scam-Proofing Loyalty at Scale: What ATO Protection Should Look Like

Scam-Proofing Loyalty at Scale: What ATO Protection in Retail Should Look Like in 2025 Retail fraud has gone public. It no longer happens quietly in the background. Today’s scams are faster, sharper, and designed to look exactly like your brand. A spoofed checkout flow can harvest thousands of credentials before your SOC team even sees a spike. But the real damage isn’t always technical. In 2025, one impersonation scam can trigger waves of fake complaints, social media outrage, and reputational backlash that cost far more than the fraud itself.

Agentic AI in Cybersecurity: Real-World Impact & Strategic Insights

In this webinar, the Securonix team breaks down how agentic AI is transforming cybersecurity from theory into measurable results. Hear directly from our experts on the Response Agent and other AI-driven capabilities that help modern SOCs detect threats faster, cut through alert fatigue, and deliver outcomes that boards can trust. What you’ll learn: This session is packed with real-world examples and strategic guidance for CISOs, SOC leaders, and analysts who want to modernize security operations, demonstrate ROI, and prove resilience in the boardroom.

Solving Wicked Tech Problems: A Conversation with ITHQ's Scott Nursten

ITHQ's CEO, Scott Nursten reveals the secret to building a wildly successful MSP. Focus on outcomes, not just revenue. Learn how their commitment to solving "wicked tech problems" led them to adopt JumpCloud as the core platform for providing clients with identity freedom, multi-platform device management, and a robust defense against Shadow IT.