Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Trustwave Managed Detection & Response

Don’t let complexity and cyber threats get in the way of moving your business forward. Trustwave Managed Detection and Response (MDR) is an industry-leading rapid threat detection and response service. We monitor, investigate, and respond to active threats to your business 24x7. Augment your team today with cyber experts for superior protection against the most sophisticated threats.

The State of Bot Management 2022 - Netacea

In 2021, we published our first “Cost of Bots” report. 2021 was a time of flux, of lockdowns, furloughs, and home working. A lot of predictions were made as to how this would change cybersecurity. A year on from our cost of bots report, we wanted to know what has changed. Has remote working led to a new wave of bot attacks? Is there a better understanding of how these attacks work? Are businesses fighting back, or losing the war?

ONUG 2022 How S&P Global Introduced Digital Twin Technology to Deliver a Seamless Network Experience

Essential Network Intelligence: How S&P Global Introduced Digital Twin Technology to Deliver a Seamless Network Experience to their Developer Ecosystem – Forward Networks Main Stage Keynote

Webinar: The Critical Factors to Look for in a Cybersecurity Vendor - 10 November 2022

Are you assessing which cybersecurity vendor to use for your business, or even consolidating to just one? There are some key characteristics and business strategies you’ll want to consider. We’ve turned to global business leaders to share their experience vetting cybersecurity vendors and even trends in the security industry that influenced their choice. WatchGuard’s Chief Information Officer Wayson Vannatta will host our four panelists.

Keeping Your Recovery Plans Up to Date

It’s critical to have recovery plans like business continuity, disaster recovery, and incident response plans. However, where many organizations fall short is in keeping these plans evergreen. An incident can blindside an organization when they discover its response plan no longer reflects the environment they need to protect. So how can your organization keep its recovery plans accurate and up to date?

Artificial Intelligence and Machine Learning: A Growing Reality

James Rees talks about ai or artificial intelligence and machine learning as science fiction staples for 20 years but is now a growing reality. Connect with James Rees Hello, I am James Rees, the host of the Razorwire Podcast. This podcast brings you insights from leading cyber security professionals who dedicate their careers to making a hacker’s life that much more difficult.

Escaping a Docker container

Escaping a docker container can get you access to the whole linux host, so it's a precious technique for a cyber attack. But it's also valuable for defenders: hacking docker containers to get a breakout is a fun way to better understand a vulnerability and how to better protect from these exploits! In this hands on video, we look at three real life scenarios where you can actually break out from a docker container.