Webinar | Security | Firewall
Palo Alto Networks

Join this 3 hour hands-on investigation and threat hunting virtual workshop to boost your skills and learn how to use Cortex XDR to stop sophisticated attacks by:

Creating custom rules to alert...

Read MorePublished: 27/11/2020
Whitepaper | Security | Access Management
Centrify

A business leaders' guide to meeting and exceeding the Australian Signals Directorate Essential Eight cybersecurity incident mitigation strategies with the help of Centrify's Identity-Centric PAM...

Read MorePublished: 27/11/2020
Whitepaper | Security | Access Management
Thycotic

This free eBook details the right people, processes, and technologies you need to plan and execute an advanced PAM program. Incorporating Thycotic’s experience with more than 10,000 PAM customers...

Read MorePublished: 27/11/2020
Webinar | Security | Access Management
Auth0

Join Auth0 and Bessemer as we unpack the new insights that surfaced from a survey run in partnership with SD Times from over 350 developers, managers, and executives in application development across...

Read MorePublished: 27/11/2020
Webinar | Security | End Point
Sophos

Due to Covid-19 exposure risks, this course will be delivered as a virtual classroom delivery. This will allow students to participate and become certified, while eliminating possible...

Read MorePublished: 26/11/2020
Whitepaper | Security | SIEM
Tenable

As a security consultant, you need to manage widely varying requests from different clients, while also standing out from competitors in your space by delivering quality results. Nessus Professional...

Read MorePublished: 26/11/2020
Whitepaper | Security | SIEM
Tenable

Security leaders who align with the business are better prepared to help their organisations make risk-based decisions. So, why do so many security executives struggle to communicate cyber risk in...

Read MorePublished: 26/11/2020
Whitepaper | Security | SIEM
Tenable

The Monetary Authority of Singapore (MAS) published updated Cyber Hygiene legal requirements. The rapidly evolving nature of cyber threats and the acceleration of digital transformation has resulted...

Read MorePublished: 26/11/2020
Whitepaper | Security | SIEM
Tenable

The attack surface in your network is continually evolving, and new vulnerabilities are disclosed every day.

You can’t hope to keep up with threats without conducting regular vulnerability...

Read MorePublished: 26/11/2020
Webinar | Security | End Point
Fortinet

Not only can you detect and prevent breaches with the FortiEDR solution, but you also have the ability to streamline SOC operations by automating manual processes, freeing security teams to become...

Read MorePublished: 26/11/2020
Webinar | Security | End Point
Fortinet

Endpoint resilience is an achievable state thanks to the power of FortiEDR. Learn how to enable advanced, real-time threat protection for endpoints both pre- and post-infection.

Read MorePublished: 26/11/2020
Webinar | Security | End Point
Fortinet

What major threat trends are dominating 2020, and how should security teams align their people, processes, and technology? Join this detailed discussion with experts from FortiGuard Labs and receive...

Read MorePublished: 26/11/2020
Whitepaper | Security | Web Security
Clearswift

Clearswift’s adaptive data loss prevention (DLP) solutions allow organizations to implement simple and flexible controls to secure business communication channels. These controls have the specific...

Read MorePublished: 26/11/2020
Whitepaper | Security | End Point
Sophos

As much of the world shifted to remote work in 2020, cybercriminals upped their game, devising ways to use the fears and anxieties of organizations and end users against them. Ransomware continues to...

Read MorePublished: 26/11/2020
Webinar | Security | Access Management
Okta

Join us December 9th to hear all about the recently released and upcoming features across Okta’s product portfolio. Take a deep dive in the product functionality and the benefits it can do for your...

Read MorePublished: 26/11/2020
Webinar | Security | Access Management
Okta

Okt{ales} with Merrick Watts - A Virtual Beer Tasting

3 Dec 2020 - 4:30PM AEDT; 4:00PM NZDT

This fun event goes virtual in 3 time zones and showcases Merrick Watts one of Australia’s well-known comedian’s and gourmet critic, who will host a virtual beer tasting with two of the newest gourmet...

Read MorePublished: 26/11/2020
Whitepaper | Security | End Point
Webroot Software

Webroot BrightCloud® Threat Intelligence Services are designed to integrate with our partners’ technology to give them a competitive edge and help them build stronger products for their customers....

Read MorePublished: 25/11/2020
Whitepaper | Security | Web Application Firewalls
Radware

This white paper provides a technical overview of how web application firewalls can safeguard Kubernetes environments without impeding DevOps.

Read MorePublished: 25/11/2020
Whitepaper | Security | Web Application Firewalls
Radware

Radware’s ERT Threat Research Center has created a unique threat intelligence feed that is specifically designed to prevent DDoS attackers from scouting and analyzing your organization’s network prior...

Read MorePublished: 25/11/2020
Whitepaper | Security | Web Application Firewalls
Radware

These Frost & Sullivan paper outlines the importance and advantages of deploying a hybrid DDoS mitigation strategy that combines on-premise mitigation with cloud-based scrubbing.

Read MorePublished: 25/11/2020
Show More..
Top
ITUpdate loading
Loading...