Articles

Recent Cybertalks

Does Remote Work Present a Major Cybersecurity Threat?

Date: June 29, 2022 Time: 10 a.m. EDT/3 p.m. BST/7:30 p.m. IST Topic: : Does Remote Work Present a Major Cybersecurity Threat? [su_button url=”#attend” style=”flat” background=”#a51c30″ color=”#ffffff” size=”5″ center=”no” radius=”0″ text_shadow=”0px 0px 0px #000000″ class=”alignleft”]Watch Now[/su_button] [su_spacer size=”20″ class=””] Abstract: Not everyone has the cybersecurity skills or awareness to stay safe on the internet, where…

Read article
The Dos and Don’ts of API Security

Date: June 22, 2022 Time: 9 a.m. MDT/4 p.m. BST/8:30 p.m. IST Topic: : The Dos and Don’ts of API Security Watch Now Abstract: Cybercrime is on the rise, and no technology is immune to attacks by malicious actors. Application programming interfaces (APIs) are becoming more prevalent in cloud computing, the Internet of Things, and…

Read article
Cyberthreat-Hunting-and-Intelligence-in-IoT-Environments
Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments

Date: May 27, 2022 Time: 10 a.m. EDT/3 p.m. BST/7:30 p.m. IST Topic: Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments Watch Now Abstract: Cybersecurity is a never-ending fight. As security professionals develop advanced strategies to stop one attack, malicious hackers invent more sophisticated tactics for penetrating networks and covertly stealing confidential data.…

Read article
Core-Digital-Forensics-Skills-for-Cyber-Investigations
Core Digital Forensics Skills for Investigating Cyber Incidents

Date: May 13, 2022Time: 10:30 a.m. EDT/3:30 p.m. BST/8 p.m. ISTTopic: Core Digital Forensics Skills for Investigating Cyber Incidents Watch Now Abstract: Digital advances have enabled malicious actors to penetrate networks even in secure environments. Law enforcement agencies and other organizations use digital forensics to trace the path of a cyberattack by analyzing vast amounts…

Read article
What-Ethical-Hackers-Need-to-Know-About-Emerging-Technologies
Ethical Hacking: Emerging Technologies that Require Red Teamers

Date: April 29, 2022Time: 9:30 a.m. MDT/11:30 a.m. EDT/4:30 p.m. BST/9 p.m. ISTTopic: Ethical Hacking: Emerging Technologies that Require Red Teamers Watch Now Abstract: Thanks to emerging technologies like cloud computing, the Internet of Things, and blockchain, businesses have become more cost effective and efficient. However, these developments have also created new attack surfaces for…

Read article
What-Is-the-Future-of-Cybersecurity
What Is the Future of Cybersecurity?

Date: April 28, 2022Time: 9 a.m. CDT/3 p.m. BST/7:30 p.m. ISTTopic: What Is the Future of Cybersecurity? Watch Now Abstract: With the increasing integration of digital technology into daily life, cyberthreats have become far more prevalent. Advanced cyberattacks are on the rise as organizations rush to incorporate innovative technologies into their business agendas and are…

Read article
Oriyomi-Fowler-banner
Skills, Trends, and Challenges in Modern Network Defense

Date: April 14, 2022Time: 11:30 a.m. EDT/4:30 p.m. BST/9 p.m. ISTTopic: Skills, Trends, and Challenges in Modern Network Defense Watch Now Abstract: Emerging technologies are transforming global network security environments and perimeter security. Advancements in cloud computing and storage, the Internet of Things, and remote access have challenged IT professionals to implement innovative and sustainable…

Read article
Why Addressing Cybersecurity Vulnerabilities Is a Top Priority

  Date: April 12, 2022Time: 8 a.m. EDT/1 p.m. BST/5:30 p.m. ISTTopic: Why Addressing Cybersecurity Vulnerabilities Is a Top Priority  Watch Now Abstract: All businesses need to be vigilant in protecting themselves against cybersecurity risks and vulnerabilities—though considering the ever-expanding list of cybersecurity vulnerabilities, enterprises may sometimes feel as if they are waging a losing…

Read article