Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Why User Activity Monitoring (UAM) is a Must for SMBs

The evolution of the professional work environment and digital transformation continues to challenge the boundaries of traditional workforce management systems and practices. With 28% of workers worldwide working from home at least one day a week, gaining visibility into the digital behavior of the workforce is paramount to effective and secure management.

Webinar: Mitigating Benefit Threat through Rapid Data Processing & AI Modeling

With EBT SNAP fraud on the rise, safeguarding our most vulnerable populations is a growing challenge across the U.S. This webinar will equip you with actionable strategies to protect the integrity of EBT beneficiary cards and merchant acceptance. Learn tips and tricks related to sharing transaction data insights, detecting malicious EBT transactions with speed and accuracy, and implementing risk scoring and behavioral analysis without bias. Leave with new ideas to enhance your EBT fraud strategy efficiently and effectively--without taxing your team or your budgets.

The Cost of Being A CISO - Part: 1Personal, Professional & Organisational Challenges

Join us for part one of our two-part series examining the world of Chief Information Security Officers. This episode welcomes back Richard Cassidy, Field CISO at Rubrik, and Oliver Rochford, former Gartner analyst and founder of Cyberfuturist. This episode offers insights that will give you insight into what makes security leadership successful - and what can lead to failure.

It's Tuesday: Do You Know if You're Compromised?

How do you know that your organization is not breached at this very moment? Many threats are designed to lurk in the shadows, going undetected before causing damage and extracting confidential data from unassuming organizations. And a traditional threat hunt searching for known Indicators of Compromise (IoCs) doesn’t always detect the threats designed to evade.

To the Point: Top State CIO and CISO Priorities for Tomorrow's Landscape with Teri Takai

In this episode of To the Point, Teri Takai, Senior Vice President for the Center for Digital Government, and renowned public-sector technology leader, brings her wealth of experience to highlight the shifting priorities for state CIOs and CISOs as they prepare for the complexities that they face in a constantly evolving cyber landscape. From AI safeguards to the critical role of data management, this episode provides actionable insights for IT leaders at every level.

Tanium Converge 2024 Recap - Tanium Tech Talks

Tanium Converge 2024 announced some amazing tech! Join two Tanium talkers for an insiders look as we review what happened during this special week. Find out which keynotes to watch on-demand for free. Also check out the other in-person Converge interviews on the Tanium Tech Talks playlist on the channel here. Will we see you there in 2025? Tanium's 2024 Converge user conference was held November 17-21 in Orlando, Florida. Converge 2025 will be in Orlando, Florida, November 17-20.#CatchMeAtConverge.

Tanium Semiannual Release SAR - Tanium Tech Talks #113

The new semiannual release schedule is for customers that use Tanium on premises. The semiannual releases streamline the deployment process and enhance the stability and predictability of Tanium solutions. By transitioning from weekly updates to semiannual releases, Tanium aims to ease the work involved for Tanium administrators to plan and deploy releases. See how on-prem customers get all the enhancements already enjoyed by cloud customers in high-quality, predictable releases.

Top Tool Capabilities to Prevent AI-Powered Attacks

Recent advances in AI technologies have granted organizations and individuals alike unprecedented productivity, efficiency, and operational benefits. AI is, without question, the single most exciting emerging technology in the world. However, it also brings enormous risks. While the dystopian, AI-ruled worlds of sci-fi films are a long way off, AI is helping cyber threat actors launch attacks at a hitherto unknown scale and level of sophistication. But what are AI-powered attacks?

Streamlining IT: Integrating device security and compliance with Jamf and Tines

Unlock the potential of automation to simplify and enhance Mac and mobile device security and compliance. Join us as we explore how Tines and Jamf work together to streamline critical tasks for IT and security teams. During the webinar, we covered: Whether you’re focused on device management and security or looking to reduce manual efforts, this session will provide valuable insights for how to optimize your workflows with Tines and Jamf.