Video On Demand - Configuration Drift and the Risk of Misconfiguration

Misconfigurations can undermine security even on fully patched systems. In this webinar, CalCom’s Co-Founder and Director of Business Development Roy Ludmir explains what configuration vulnerabilities are, how configuration drift happens, and why it matters for both cyber risk and compliance. Questions? Want to talk about server hardening for your organization? Contact us at info@calcomsoftware.com.

A Comprehensive Guide to Continuous Threat Exposure Management (CTEM)

Continuous Threat Exposure Management is a continuous security framework for identifying, assessing, validating, and reducing the exposures that matter most to an organization. Rather than treating every exposure, alert, or control issue as equally urgent, CTEM helps organizations focus on the exposures that are actually reachable, relevant to likely attack paths, and meaningful in a business context.

Inside Fidelis CNAPP: A Detailed Look at the Features That Strengthen Cloud Security

Cloud adoption is accelerating, but cloud security complexity is growing just as fast. Security teams now manage hybrid workloads, multi-cloud environments, containerized applications, and sensitive cloud-native data. Traditional tools designed for on-prem environments often struggle to provide consistent visibility across these dynamic systems. This creates operational pressure. Teams deal with fragmented alerts, inconsistent policies, and uncertainty about real cloud risk exposure.

Meet HIPAA, GDPR, SOC 2, and NIS 2 requirements with Acronis Cyber Protect disaster recovery

You might feel sure that your organization can recover quickly from a cyberattack. But can you prove it? To remain compliant with major regulatory requirements, you have to be able to demonstrate recoverability. Compliance frameworks worldwide, including HIPAA, GDPR, SOC 2 and NIS 2, are increasingly requiring that organizations prove they can recover from system disruption, cyberattacks and data loss quickly and reliably. In other words, recovery time must be auditable.

Recover from IT Outages in Minutes - What Indian MSPs Must Know

Downtime can cost businesses revenue, productivity, and customer trust. Whether it's a server crash, ransomware attack, hardware failure, or accidental deletion, every minute matters. In this webinar, learn how modern IT teams and MSPs can reduce recovery time from hours to minutes and keep critical systems running with minimal disruption. Who should watch: IT Managers • System Administrators • MSPs • Business Leaders. Watch the full session to discover practical strategies for faster backup and disaster recovery.

FBI: Phishing Attacks Are Impersonating City and County Officials

The US Federal Bureau of Investigation (FBI) has issued an advisory warning of a phishing campaign that’s impersonating city and county officials to send phony requests for permit fees. “Individuals and businesses with active applications for land-use permits are being targeted by criminals impersonating city and county planning and zoning board officials, fraudulently requesting fees associated with these permits,” the FBI says.

Shopify Legacy Accounts Are Deprecated: What Every Merchant Needs to Know Right Now

Shopify has officially deprecated Legacy Customer Accounts as of February 2026, marking a major shift in how customer authentication works across Shopify stores. It has also been confirmed that a final sunset date will be announced later in 2026, after which legacy templates will be locked from editing and eventually removed.

Securing AI from within with Saurabh Shintre

Join us for this session of Defender Fridays as we explore securing AI from within with Saurabh Shintre, Founder and CEO of Realm Labs. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

The best compliance management software for 2026

In 2026, compliance work shouldn’t mean chasing screenshots, living in spreadsheets, or chaotic fire drills to get compliant. If you’re still tallying up hours upon hours of compliance work, it’s time to find a compliance management software that helps you automate compliance, manage risk, and prove trust. ‍ Not sure where to start?

How Do I Send a Secure Email in Outlook?

Sending an unsecured email can be likened to writing sensitive information on a sticky note and leaving it on someone else's desk: anybody can intercept and share that information. Fortunately, there are ways to ensure your emails are safe from the prying eyes of hackers through encryption, meaning your message — no matter how sensitive — is seen only by the intended recipient.