Webinar
Many emerging technologies, from artificial intelligence to quantum computing to synthetic biology, involve computational systems and are vulnerable to manipulation by malicious actors. Our experience with the IT and internet revolutions of the late 20th and early 21st centuries demonstrates that we need to integrate security into these technologies from the beginning,…
Webinar
Claims about AI tend toward the extremes. Either it’s the technology that will finally usher in the Golden Age of IT or it signals the end humanity and the rise of the machines. While neither extreme is likely, most organizations are grappling with this technology and the claims that the…
Webinar
While down from its high-profile peak in 2021, ransomware remains a serious threat to businesses, non-profits, and governments. As organizations increase their resilience to ransomware attacks focused on data encryption, malicious actors are employing tactics like data dumping, harassment, denial of service attacks, and other techniques to get victims to…
Webinar
As the cybersecurity industry nears 30 years of mature existence, it’s still difficult to agree on the metrics most indicative of cyber health, and clearly communicate progress against those metrics to stakeholders with diverse interests and understanding of evolving threats. The Biden Administration’s new National Cybersecurity Strategy has placed a…
Webinar
On the surface, Stronger Together seems like a no-brainer. No one would argue that we are “Weaker Together” or “Stronger Alone.” Yet, the community does not always act like this statement is true; instead, we sometimes turn on each other more aggressively than any adversary. How do we transform…
Webinar
For decades we have been faced with the classic ‘last mile’ challenge when it comes to information sharing and threat intelligence. Often times an end user’s use case simply does not fit with what is being offered through the threat intelligence platform. And so it becomes a case…
Webinar
Mention cybersecurity to most people and the reaction is rarely, “Oh, I understand what that’s about.” Instead, most people think of it as a mystic art, understood only by a few (nerdy) hacker-types (in hoodies). Yet, cybersecurity is now critical to almost every economic, social, and public safety function…
Webinar
Many countries are implementing mandatory cyber incident reporting requirements, including the US, EU, Australia, and India. While the typical private sector instinct might be to oppose such rules, properly drafted reporting requirements will ultimately benefit the business community. Governments and cybersecurity providers can use the resulting information to provide tailored…
Webinar
2022 was the year when what didn’t happen was more interesting than what did happen. Despite the Russian invasion of Ukraine, widespread cyber attacks outside of the immediate combat zone did not materialize. Although Log4j was a serious vulnerability, few intrusions or attacks have been blamed on it. High…
Webinar
Adversaries constantly innovate and explore new and more powerful DDoS attack methods, called vectors, creating new ones every year. As DDoS defenses become more precise and effective, attackers continue to find ways to bypass those defenses – making it every more difficult to protect your organization. Join us as…