Filtering By Tag 'Webinar'
x clear filterEnhancing your Zero Trust Approach to Access Management with Context and Risk [Webinar]
A Verizon Report recently found that far more breaches are stemming from identity tactics than network vulnerabilities. Watch this webinar to learn how addressing identity technology can deter hackers and insider threats to better protect your organization.
If You Want to Catch More Phish, Use More Hooks [Webinar]
Within the past two years, the number of non-signature based attacks has increased significantly. These attacks, like name impersonations and domain lookalikes, have become so sophisticated that they're nearly impossible to tell apart from the real thing. Watch this webinar to learn how to better secure your mailboxes with IRONSCALES.
The Power of Security Metrics in Your Organization [Webinar]
Businesses are turning to third-party vendors to help conduct day-to-day operations. While that often allows for the most efficient use of resources, it presents a challenge: how do you ensure that your third-party vendor's business practices are as safe and secure as your own?
Watch the webinar to see why current methods for measuring vendor security fall shot, and how to get a full picture of their security posture.
Bringing Endpoint Detection & Response into the Modern Age [Webinar]
Most security breaches happen at the endpoint because they are the most mobile, utilize the most applications, and are made vulnerable by human use. It's no surprise, then, that hackers are always evolving their strategies to defeat endpoint security protocols. Watch this webinar to learn more about protecting your devices from attacks that are hitting your networks.
Ensuring Network Viability with Simpler WiFi and Application Testing [Webinar]
Research found that more than half of issues are typically detected by end users before IT personnel are aware. Additionally, over a third of end users report poor network connectivity or poor performance at their workplace. Because of this, greater app viability is essential -- watch this webinar to learn more about how you can do this.
Taking Charge of Your Firewall with Rulesets [Webinar]
Networks of the past -- with only a few devices and manually written rules -- were relatively stable compared to the complex and dynamic networks we see today. Watch this webinar to learn how to better manage firewall rulesets with technology such as Cloud Computing, Virtualization, IoT, and more.
Setting Traps for Security Hackers with Deception Technology [Webinar]
Deception Technology lures attackers into strategically placed decoys, triggering a report that records details around the attempt. With the treat landscape constantly evolving, working from within the network can be an effective means of preventing attacks.
The Need for Artificial Intelligence in Today’s Security Landscape
All of your "smart" devices, regardless of their function, are vulnerable to cyber-attacks. Read more about how DarkTrace's Enterprise Immune System uses Artificial Intelligence and machine learning to establish the norm in your network and detect and respond to any abnormalities.