From Our Advertisers
Sponsored by Fortinet
Driving Digital Innovations and High Performance On and Off the Race Track
BMW Motorsport relies on Fortinet to secure parts of their motorsport environments and operations across a highly distributed infrastructure.
Sponsored by Fortinet
Veterans are Key to Filling the Cybersecurity Skills Gap
Veterans possess situational and other traits that translate well to a role in cybersecurity.
Sponsored by Fortinet
Simplifying Security Across Hybrid Clouds, Multi-clouds and for the Cloud On-ramp with Secure SD-WAN
On-demand scalability and swift, reliable connectivity are essential—which means that the applications and data need to be seamlessly interconnected across all clouds, data centers, and locations.
Sponsored by Sophos
Changing the Narrative Around Attack Victim Shaming
Making end users feel bad about falling for social engineering attacks is not a productive way to shore up defenses.
Sponsored by Fortinet
Endpoint Detection and Response is a Key Weapon in the Battle Against Ransomware
The most important technology to preventing ransomware damage is advanced endpoint security that unifies the prevention, detection and response function in order to operate in real-time.
Sponsored by ExtraHop
The Importance of Network Data in Cloud Workload Security
Cloud workloads are deployed into highly dynamic environments, often utilizing and coexisting with a wide variety of cloud providers and third-party platforms and services. The workloads themselves can range from legacy...
Sponsored by ExtraHop
What the Colonial Pipeline Attack Means for Securing Critical Infrastructure
The cyber attack on Colonial Pipeline is the latest in an increasing number of ransomware attacks that have been targeting both private enterprise and the public sector. In this case, it appears that the ransomware variant...
Sponsored by Sophos
Don’t Make Haste! The Downside of Rushing Attribution
Collecting the wrong indicators of compromise (IOCs) can actually do more harm than good.
Sponsored by Fortinet
Defend Against Insider Threats from Remote Workers
Threats might come from a disgruntled staffer who wants to disrupt operations, an employee who sells customer data to get some extra cash, or a careless co-worker who ignores a company policy.
Sponsored by Fortinet
Four Ingredients for Effective Endpoint Security
Today, cybersecurity is a lot more complicated than installing a patch and calling it a day.
Sponsored by Cisco
End-to-End Security Starts at the Endpoint
The massive growth in endpoints requires a baseline security strategy for cohesive visibility and unified protection.
Sponsored by Sophos
How Criminals Abuse Common Security Tools – and Use Them Against You
By utilizing legitimate programs and tools, criminals can hide in plain sight on the network, causing significant damage
Sponsored by Fortinet
The Best Trust is No Trust at All
Zero trust is based on the premise that any user or device could potentially have already been compromised, and you, therefore, need to limit risk through controlled access and monitoring.
Sponsored by Cisco
Automated, Orchestrated, and Integrated: The Open Platform Approach
Security teams have enough on their plates without having to stitch together multiple tools for holistic visibility, context and response.
Sponsored by Cisco
Merging NetOps, ITOps, and SecOps for Enhanced Visibility
Networking, IT, and security teams have different objectives. Here’s how to get them collaborating for rapid response to any type of incident or issue.
Sponsored by Fortinet
Closing the Cyber Skills Gap with Fortinet’s Training Advancement Agenda (TAA)
Fortinet is dedicated to closing the cyber skills gap with our NSE Training Institute programs and Training Advancement Agenda.
Sponsored by Fortinet
Achieving Consistent Security Policies Across the Entire Infrastructure
Organizations need a unified, comprehensive cloud security platform able to run on any platform to enable solutions to communicate and integrate.
Sponsored by Fortinet
Protecting 5G Networks Requires an Integrated, Holistic Security Approach
Many organizations assume having a private network keeps them safe, but this is not often the case.
Sponsored by Sophos
Mitigating Security Threats on Nontraditional Platforms
Just because it doesn’t look like a computer, doesn’t mean it can’t be exploited. Here’s how to guard against attacks on nontraditional devices
Sponsored by Cisco
Network Encryption, Modern Applications Impact Security Visibility
Encrypted traffic, and today’s constantly changing application environments, make network security more challenging.
Sponsored by CIS
Mapping Your Way To Compliance With Cybersecurity Frameworks
Make cybersecurity program work more efficiently by "mapping" frameworks to security resources
Sponsored by CIS
Managing Your Cybersecurity Program for the Win
Discover how the right tool helps save time, prevents errors, offers transparency, and measures compliance
Sponsored by Hewlett Packard
How to Properly Vet a Security Service Provider
Hewlett-Packard security specialist Tom Masucci outlines key criteria to consider when assessing providers. Hint: Be ready to talk risk tolerance.
Sponsored by Cisco
A Healthy Boost: Hospital Uses Managed Services to Bolster Security
The Brooklyn Hospital Center addresses sophisticated security threat landscape with the help of Cisco.
Sponsored by Sophos
The Way Forward: 5 Security Fixes to Support a Hybrid Workforce
Work from home and newer hybrid models will continue even after the pandemic. Here’s what to do now to ensure security keeps pace
Sponsored by Cisco
Strong Security Comes in Small Packages
Small and midsize businesses should lean on existing security strengths for resiliency and ongoing success.
Sponsored by Sophos
Dirty Tricks: The Latest in Ransomware Tactics
New Conti ransomware is harder to find, and more damaging than previous types of attacks. But good security hygiene can help.
Sponsored by ReliaQuest
The Top 3 Most Common Cloud Attacks and How to Avoid Them
Security teams should be aware of the most common attack classes used against AWS, Azure, and GCP.
Sponsored by CIS
Remediate Insecure Configurations to Improve Cybersecurity
With CIS, translate cyber threat information into action while saving time
Sponsored by ExtraHop
Why Network Detection and Response Belongs in Your 2021 Strategy
2020 brought with it a series of changes with very little notice, and left even less time for planning. A year after a mass work-from-home migration, it has become clear that the changes seen in 2020 marked a turning point, not an...
Sponsored by ExtraHop
Microsoft Exchange Server Security
The recent news of active exploitation of the Microsoft Exchange Server vulnerabilities has highlighted the importance of network visibility in securing critical server infrastructure. Microsoft quickly patched the vulnerability,...
Sponsored by ExtraHop
What Is a Next-Generation Intrusion Detection System?
After an online panel discussion on upgrading intrusion detection systems (IDS) to next-generation IDS, an interested participant reached out through LinkedIn. He had a simple question: “So, what is the definition of next...
Sponsored by Sophos
Healthcare Organizations: Moving to High Alert for Ransomware
Often underfunded for security, healthcare organizations need to guard against increasingly common ransomware attacks using new techniques.
Sponsored by ReliaQuest
Why Choose Open XDR? It's the Integration
If XDR is about integrating varying tools across the security stack, Open XDR goes a step further.
Sponsored by Sophos
What’s Next in Battling Ransomware? Human-driven Threat Hunting
Most organizations can defend against malicious code, but today’s security strategy must monitor for malicious behaviors. The answer: human-driven threat hunting and managed threat response.
Sponsored by CIS
How Configuration Assessments Help Improve Cyber Defenses
Assessing Regularly is the Key to Reducing Risk from Poorly Configured Systems
Sponsored by CIS
Getting a Grip on Basic Cyber Hygiene with the CIS Controls
Guidelines will help distinguish the ‘should’ from the ‘must-do’ precautions
Sponsored by Hewlett Packard
It’s Time to Take a Fresh Approach to Combat Phishing
Once an employee clicks on a malicious attachment, the now-infected employee becomes an attacker. When “the bad guy is you,” only a zero-trust approach will suffice.
Sponsored by Cisco
Don’t Make This Mistake on the Journey to Passwordless Security
Enterprises are slowly shifting away from enterprise password use and over to more secure alternatives. But IT leaders must build a security strategy beyond these measures.
Sponsored by Cisco
The Journey to SASE: Cisco Eases Security Complexity
Securing the enterprise might sometimes seem like playing tactical-action video game, where the attackers constantly level up. The security platform architecture Secure Access Service Edge (SASE) simplifies things.
Sponsored by ReliaQuest
5 tips for maximizing the effectiveness of your EDR solutions
Follow these five steps to get the best possible ROI on your endpoint detection and response solution.
Sponsored by CIS
3 Key Elements of a Strong Cybersecurity Program
Know what you have, focus on endpoints, and stay in compliance
Sponsored by Cisco
Water Tight: Utility Secures its Infrastructure and Workforce
The organization says its use of Cisco solutions has enabled greater security visibility and peace of mind.
Sponsored by ReliaQuest
Hack to the Future: Why Attack Simulations are the Future of Security Control Testing
Security teams have prioritized attack simulations as organizations drive innovation and manage complexity.
Sponsored by ReliaQuest
4 Strategies for Improving Visibility into Your Cloud Data
These techniques can help security teams gain visibility of data across multi-cloud environments and generate new business opportunities.
Sponsored by ReliaQuest
5 Threat Hunting Techniques to Proactively Improve Your Security Posture
Apply these five techniques to build a scalable threat hunting program and take your team from reactive to proactive.
Sponsored by CIS
Configuration Security for Remote Endpoints with CIS-CAT Pro
Check out these resources to automate your configuration review
Sponsored by CIS
2021 Cybersecurity Trends to Prepare For
Read why Zero Trust, Remote Work, Ransomware, are Privacy Top of Mind for these Experts
Sponsored by CIS
How to Scan Remote Endpoints From Wherever You Are
Discover this secure way to measure security against standard benchmarks — from anywhere
Sponsored by Hewlett Packard
What It Takes to Implement Zero Trust With Employees Working From Home
The pandemic has changed the focus for zero trust to locking down endpoints, wherever they may be. Cloud-based services can help.
Sponsored by ReliaQuest
5 Often-Overlooked Log Sources
Some data sources present unique logging challenges, leaving organizations vulnerable to attack. Here’s how to navigate each one to reduce risk and increase visibility.
Sponsored by Hewlett Packard
Measuring HP Sure Click Enterprise’s Return on Investment
See how this transformative endpoint security approach pays for itself in less than a year.
Sponsored by Hewlett Packard
A New Model for Defeating Cyberattacks and Reducing Costs
Understanding the ROI of an isolation approach
Sponsored by ReliaQuest
Prioritize Your Security Automation Tasks in 4 Steps
Want to deliver the highest ROI on your security automation? Follow these guidelines.
Sponsored by Hewlett Packard
HP Predicts More Targeted Cyberattacks in 2021
Zero trust is expected to become the new standard to combat them.
Sponsored by ReliaQuest
4 Steps to Integrate Threat Intelligence into Your Security Operations
Implement these steps to get more value out of your threat intel, minimize risk, and reduce the possible financial and operational impacts of attacks.
Sponsored by ReliaQuest
3 Metrics Every CISO Needs to Reduce Risk – and Build Budget
The security metrics that many CISOs traditionally use typically lack business context and often fail to provide a comprehensive and actionable view of how the security program decreases risk and enables the business. This can...
Sponsored by CIS
20 Years of Creating Confidence in the Connected World
From a Handful of People to a Movement
Sponsored by Hewlett Packard
How Analytics Can Help Overcome Security Talent Shortage
As they train the next generation of security experts, organizations can use analytics and service providers to offer cyber protection today.
Sponsored by Hewlett Packard
Endpoint Security: Protecting Your Distributed Workforce From Old and New Threats
Follow three strategies to mount a proper defense for employees working at home.
Sponsored by Hewlett Packard
How Managed Security Services Help You Get More from Your Existing PCs
It’s time to rethink security with a cloud-based offering that takes advantage of artificial intelligence to detect and thwart threats.
Sponsored by Hewlett Packard
Ensuring Security with Modern IT Endpoint Management
What is required is a strategy that makes onboarding a new Windows PC as easy as getting a new phone.
Our Sponsors





