With an estimated 4,000 ransomware attacks occurring each day, it has now become a material threat to corporate data. With this recent Druva survey of over 800 IT professionals, learn how...
12 Jul 2017 - 2:00PM HKT
Join Radware for a webinar to learn a rapidly evolving threat landscape: key trends in DDoS attack, the new generation of attacks: IoT botnets open the 1Tbps floodgates and many more.
11 - 13 Jul 2017 - 10:30AM IST
A broad range of topics will be covered during this 3 day webcast series, including mobile devices, app and data management with Intune, hybrid identity and access management with Azure Active...
In the 2017 State of Cybersecurity report, thought leaders at Forcepoint assert that the security industry is in need of a paradigm shift toward examining user behavior and intent. The report...
20 Jul 2017 - 1PM SGT
In this free, two-hour virtual workshop, you will learn Migrating to a Palo Alto Networks next-generation firewall is a critical step toward the prevention and detection of cyberattacks.
06 Jul 2017 - 1PM HKT; SGT; MYT
The traditional security perimeter that your IT team used to be able to define surrounding cloud security is now dissolving. So if you are adopting more cloud services, putting more employees in...
18 Jul 2017 - 10AM AEST
RSA would like to invite you to attend a webinar on "The Roadmap of Risk Culture" on Thursday 22 June 2017 at 10 am. The webinar will discuss some of the important points in building a risk culture as...
With the Palo Alto Networks Application Framework, we are ushering in the future of security innovation, reinventing how customers rapidly access, evaluate and adopt the most compelling new security...
13 Jul 2017 - Jakarta, Indonesia
Cyber-resilient organizations are able to limit damage and recover quickly in the event of successful attacks, a key capability to successfully managing cyber risk. This session will give you the...
The key steps you need to take in order to minimize the potential for security breaches and loss of data associated with mobile devices.
To explore this under-reported aspect of enterprise threats, Proofpoint created The Human Factor Report.
05 Jun 2017
New capabilities reduce risk by securing local administrator passwords and simplifying Mac application management with turnkey Munki integration.
08 Jun 2017
Over half say they would trust technology over humans as a way of avoiding mistakes.
13 Jun 2017
Centrify’s solution is in the final stage of achieving compliance with the Federal Risk and Authorization Management Program (FedRAMP).
20 May 2017
Check Point researchers discovered a new attack vector that could allow hackers to create malicious subtitles to target users of popular media platforms to gain complete control of users’ PCs,...
Get your own copy to read about how One Identity Active Roles can help you manage your entire hybrid environment with one solution, avoid common implementation mistakes, ensure your AD/AAD data is...
06 Sept 2017 - Adelaide, Australia
In this free half-day technical workshop you will learn how to defeat the adversary at the endpoint.
An Infrastructure Security Review by the Zscaler Solution Architect team.
Cloud sandboxing protection is as essential to security as keys are to encryption. Preventing CIOs and CISOs from having to make excuses when it comes to APTs, zero-days, and ransomware.
How RASP and Behavioral Biometrics Help You to Make the Best Mobile App Security Decisions.
Your search did not match any content.