Find out what's inside the February 2020 edition of the Journal & download a free copy of this month's featured article
Past Web Conferences
More than 99% of all targeted cyber attacks rely on users to activate them. Nowadays, threat actors are not going after an organization's technology and infrastructure. They are going after your most valuable assets – your people and your data.
Automated bot attacks are becoming increasingly sophisticated as they learn to avoid detection and stay unidentified longer. Tune in for the live webinar on October 16 at 1:00 PM EST as Liel Strauch, a Lead Researcher at PerimeterX and Deepak Patel, VP of Product Marketing at PerimeterX, highlight the top five ways to identify automated bot attacks to your website.
In this panel webinar, ObserveIT’s Head of Security, Chris Bush, will interview two experts on the topic of the risk from insider threats. We will illuminate the seven common motives — also known as the seven deadly sins — that influence insider threats and share best practices for defending against them. We will explore what makes insider threats so different from traditional external threats.
In a recent Thales survey, two-thirds of CISOs cited the increase in cloud service adoption, combined with a lack of strong security solutions, as the main reasons cloud services are the prime targets of attack.
How protected are you from the latest types of DDoS attacks? Our new cyber threats report confirms that DDoS attacks continue to be an effective means of inflicting damage to brand and revenue.