Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Forward Networks: Reduce costs & accelerate digital transformation by democratizing the network

Join Bob Costello, A former senior executive, in the Office of Information and Technology at U.S. Customs and Border Protection, and Andre Kindness, Principal Analyst at Forrester Research to learn how detailed visualization, verification, and prediction capabilities enabled Bob to: - Justify budget for network upgrades - Create a single source of truth that improved efficiency and effectiveness for software engineers, the NOC, and the SOC

Forward Networks: Extending Zero Trust to the Cloud

Trying to make sense of your cloud security posture shouldn't mean flipping between multiple screens and inferring how traffic is behaving. Join this live event to see how you can monitor and verify your security posture across multiple clouds on a single screen. Senior Technical Solutions Architect Craig Johnson (@fracticated), will demonstrate how our customers use the Forward Networks platform to manage their cloud security posture.

Lookout: Lunch & Learn: Where does mobile fit into security frameworks?

Lookout is hosting a lunch and learn webinar discussion on how mobile fits into guidance provided by organizations like NIST and CIS, how that affects compliance and security policies, and why it should matter to organizations everywhere. Join Tim Lemaster and Hank Schless as they chat about this over lunch (our treat) and answer any questions you may have about how smartphones and tablets fit into your security strategy.

Lookout: How mobile devices are leaving the door open to cyberattackers

Lisa Forte, Social Engineering & Cyber Security Expert and Hank Schless, Sr. Speaker Lisa Forte began her career in counter-terrorism intelligence for a UK Government agency before moving into one of the UK Police Cyber-Crime Units dealing with serious cybercrime cases. Through these experiences, she has gained a unique insight into the darker side of human nature and has led to her becoming one of the leading experts on cybercrime cases involving social engineering and psychological manipulation

Lookout: Understanding Chromebook Security

Google Chromebooks are a popular choice for students and employees looking for an affordable laptop to browse the web and connect to their cloud applications. By applying a defense-in-depth approach to Chromebooks, Google has built-in several layers of security to keep its customers at ease. In this webinar, Lookout takes a closer look at Chrome OS security to provide some additional insight based on our in-depth knowledge of the mobile threat environment.

Lookout: Lunch & Learn: Where does mobile fit into security frameworks?

Lookout is hosting a lunch and learn webinar discussion on how mobile fits into guidance provided by organizations like NIST and CIS, how that affects compliance and security policies, and why it should matter to organizations everywhere. Join Tim Lemaster and Hank Schless as they chat about this over lunch (our treat) and answer any questions you may have about how smartphones and tablets fit into your security strategy.

Netacea: The Four Industries Most Vulnerable to Bot Attacks

At Netacea, we wanted to know just how aware businesses are of bots and if they fully understand the threat to their businesses. Which roles are responsible, how confident are they in their bot mitigation strategies, and how well-placed is this confidence? We surveyed 200 enterprise businesses across travel, entertainment (including online gaming and streaming), e-commerce and financial services to get a broad picture of how bots are understood and protected against.

Netacea: Who Is Responsible for Bot Management?

At Netacea, we wanted to know just how aware businesses are of bots and if they fully understand the threat to their organisation. Which roles are responsible, how confident are they in their bot mitigation strategies, and how well-placed is this confidence? We surveyed 200 enterprise businesses across travel, entertainment (including online gaming and streaming), e-commerce and financial services to get a broad picture of how bots are understood and protected against.