Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding the Intelligence Cycle for Cybersecurity: Building a New ICT Infrastructure

In this video, we dive into the intelligence cycle specifically tailored for cybersecurity. With a focus on protecting digital assets, we explore the stages of Direction, Collation, Analysis, and Dissemination within the context of building a new ICT infrastructure. Starting with the initial direction, we discuss the need for a secure network architecture capable of defending against cyber threats.

Mastering Cyber Security The Sun Tzu Approach

Progress your cyber security career with our masterclass from James Rees, MD of Razorthorn Security. In part 1, we take a deep dive into one of the oldest and most highly regarded texts in history - Sun Tzu's "The Art of War" - to uncover valuable insights for information security professionals. We can't stress enough just how useful this text is for anyone in the field, and if you haven't had the opportunity to read it before, we highly recommend doing so.

Berlin Q&A with Porsche Motorspot Head of IT Tag Heuer Porsche Formula E Team

Decision making during an E-Prix is influenced by the ability to analyze data efficiently at speed. Did you know the TAG Heuer Porsche Formula E Team use multiple channels on a private network to make crucial real-time judgement calls? Watch Friedemann Kurz, Head of IT at Porsche Motorsport, to find out more.

The Tag Heuer Porsche Formula E Team uses a private network at an E-Prix. Here's why:

When it comes to IT architecture, the set-up is the same for the TAG Heuer Porsche Formula E Team, making it easier to identify bottlenecks or malware threats. Thomas Eue, Lead IT Product Manager at Porsche Motorsport, explains why the Team doesn’t connect to public networks at race weekends.

Future of Data Privacy Examining the Impact of GDPR and CPRA on Business Practices

Welcome to our exciting and informative discussion on the future of data privacy and the impact of the General Data Protection Regulation (GDPR) and California Privacy Rights Act (CPRA) on business practices! In this webinar, we cover a range of fascinating topics including an overview of GDPR and CPRA regulations, key differences and similarities between the two, and strategies for ensuring compliance.

Innovation in Cybersecurity: Building a Secure Digital World

Our mission is to build a secure digital world - but when we think about the future, we realize it can't happen without intelligence. Today, cyber threats haven't been tamed, and to get to a point that they are, involves a collective effort globally to solve for them. How? By thinking differently. Join us in building a future in which neutralizing cyber threats is the norm as our security solutions protect us.