Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Helix Electric Takes Data Accessibility and Security to the Next Level

Learn how Helix Electric took data accessibility and security to the next level with Egnyte. By consolidating all their data onto a single platform, employees on the jobsite have fast and easy access to drawings, cut sheets and contract documents -- no matter where they are working. And in the case of a ransomware attack, Egnyte’s built-in detection and recovery reduces any downtime and allows Helix to get operations back up and running quickly. And with data governance and classification features, Egnyte is foundational to Helix’s CMMC 2.0 program.

How can an external network penetration test help your business? | Cyphere

An external network penetration test is a process by which an organization hires a third party to attempt to penetrate its computer systems from the outside (over the Internet). By doing so, businesses can discover vulnerabilities in their networks that could be exploited by malicious actors and recommend relevant risk mitigation measures. In this video, we discuss the benefits of external network penetration testing and how it can help your business stay safe online.

Outpost24 webinar - The State of Ransomware in 2021 and How to Limit Your Exposure

Ransomware has continued to grow in maturity throughout the first half of 2021. As businesses struggle to understand yet another major attack that hit the Kaseya supply chain, organizations are beginning to realize data backups and cyber insurance alone won’t save them.

Protect Your iOS Keeper Vault with FIDO2 WebAuthn and Yubikey NFC

Keeper provides advanced vault protection using device verification, first-factor authentication through either Master Password or Single Sign-On, and second factor authentication through hardware based security keys like the YubiKey. Security keys provide the highest level of protection by requiring hardware authentication in addition to your password at login. The Keeper iOS app supports Yubikey FIDO2/WebAuthn security keys with a Lightning connector or NFC.

BEC in 60sec - Business email compromise

In this video, we’ll provide an in-depth explanation on business email compromise. Learn more about BEC here: Business email compromise, or 'BEC', presents a growing problem for organisations of all sizes. In fact, over 6,000 businesses are targeted each month, making the UK the second most targeted region (26%) after the US (39%). That's why you and your colleagues should be aware of the tell-tale signs of a BEC attack and what you can do to avoid falling prey to phishing attempts. Do you have any questions about business email compromise? Let us know in the comments section below!

#BigPictureCyber Town Hall With Chris Nissen, Founder & CEO, IntelWerks | 3/23/22 | NeoSystems

NeoSystems #BigPictureCyber Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly #BigPictureCyber Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, cybersecurity news, how to prepare for CMMC certification, and the latest updates from the CMMC AB.