How CISOs Should Approach Critical Cloud Security Issues
Date: June 30, 2022 Time: 9:30 a.m. EDT/2:30 p.m. BST/7:00 p.m. IST Topic: How CISOs Should Approach Critical Cloud Security Issues Abstract: Cloud storage has become indispensable for many businesses, as it minimizes costs and improves overall efficiency. While cloud computing is a boon for enterprises, however, failing to ensure cloud security could eliminate all […]
Does Remote Work Present a Major Cybersecurity Threat?
Date: June 29, 2022 Time: 10 a.m. EDT/3 p.m. BST/7:30 p.m. IST Topic: : Does Remote Work Present a Major Cybersecurity Threat? Abstract: Not everyone has the cybersecurity skills or awareness to stay safe on the internet, where hackers often use sophisticated tactics to prey on unsuspecting users. This is especially problematic for employees who […]
Network Security Essentials: Attacks and Defense Strategies
Date: June 23, 2022 Time: 10 a.m. EDT/11 a.m. BRT/7:30 p.m. IST Topic: : Network Security Essentials: Attacks and Defense Strategies Abstract: Network security encompasses all physical and virtual assets that enable data transmission between nodes or endpoints. As a result, network defense is a broad and crucial cybersecurity function that covers a wide range […]
The Dos and Don’ts of API Security
Date: June 22, 2022 Time: 9 a.m. MDT/4 p.m. BST/8:30 p.m. IST Topic: : The Dos and Don’ts of API Security Abstract: Cybercrime is on the rise, and no technology is immune to attacks by malicious actors. Application programming interfaces (APIs) are becoming more prevalent in cloud computing, the Internet of Things, and mobile applications, […]
Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments
Date: May 27, 2022 Time: 10 a.m. EDT/3 p.m. BST/7:30 p.m. IST Topic: Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments Abstract: Cybersecurity is a never-ending fight. As security professionals develop advanced strategies to stop one attack, malicious hackers invent more sophisticated tactics for penetrating networks and covertly stealing confidential data. Cyberthreat […]