Articles

Recent Cybertalks

Ricoh-Danielson
How Modernizing Incident Response Processes Can Help Stop Cybercrime

Date: 21st January, 2022Time: 9:00 AM CST/4:00 PM CET/8:30 PM ISTTopic: How Modernizing Incident Response Processes Can Help Stop Cybercrime Watch Now Abstract: Cybercrime has skyrocketed as businesses transitioned to a remote work culture in the wake of the pandemic. Ransomware attacks surged 93% in the last six months, fueled by an innovative attack technique called Triple Extortion.  The…

Read article
DevSecOps Best Practices You Need to Know to Secure Your Applications

  Date: 25th Nov, 2021Time: 4.00 PM EEST/ 6 AM PST/7:30PM ISTTopic: DevSecOps Best Practices You Need to Know to Secure Your Applications  Watch Now Abstract: Penetration testing plays a critical role in identifying application and software vulnerabilities to remediate the flaws. For faster business operations, applications are now being developed in shorter agile cycles.…

Read article
Zero Trust Network: Going Beyond the Traditional Perimeter Defense

Date: 24th Nov, 2021Time: 8.45 AM ET/7.45 AM CDT/7.15 PM IST Topic: Zero Trust Network: Going Beyond the Traditional Perimeter Defense Watch Now Abstract: Zero-Trust Network Access (ZTNA) implies a security posture where no individual user or device is considered trusted and scrutinized through identity and access management security protocols. Where the traditional security postures considered users…

Read article
John-Grim-banner
Data Privacy Exposure and the Cyber Threat Landscape

Date: 11th Nov, 2021Time: 9 AM EST / 3 PM CET / 7:30 PM ISTTopic: Data Privacy Exposure and the Cyber Threat Landscape Watch Now Abstract: Data privacy involves the appropriate handling and robust protection of confidential data. This process can come with several challenges, including those in security, governance, and compliance. For instance, the…

Read article
Andrea-Pezzotti-banner
Vulnerability Management Best Practices: What You Need to Know

Date: October 28th, 2021Time: 4:00PM CET / 7:30PM IST / 7:00AM PSTTopic: Vulnerability Management Best Practices: What You Need to Know Watch Now Abstract: Vulnerability management is defined as the “cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating” software vulnerabilities. Vulnerability management programs run successfully with structured processes implemented continuously through global best practices.…

Read article