Upcoming Events

The Future of Authentication: How Two Factor Authentication is Dying and What'sNext
2019-06-04 10:30 | 2019-06-04 11:30
Learn how new standards like WebAuthn work, how to implement them, and what attacks they protect from.
...Read more

[SANS] Authentication: It's All About the User Experience
2019-06-13 15:30 | 2019-06-13 16:30
The role of industry standards, including WebAuthn, will be addressed, along with specific recommendations to implement strong authentication that protects the organization and benefit your users.
...Read more

[SANS] Leading Change for CISOs
2019-07-03 10:30 | 2019-07-03 11:30
CISOs around the world are all realizing the same thing Cybersecurity is no longer just an IT problem, but an organizational problem. The challenge has become how can CISOs got beyond technology embed security at an organizational level
...Read more

[SANS] 10 Visibility Gaps Every CISO Must Fill
2019-08-23 10:30 | 2019-08-23 11:30
There are 10 visibility gaps that must be filled by every Chief Information Security Officer. Success in this prominent and often misunderstood role hinges on how quickly these gaps get closed.
...Read more

Sungard Availability Services to file for bankruptcy, plans restructure
Sungard Availability Services is preparing a bankruptcy filing that would lessen the company’s $1.3 billion debt...Read more

SQL Server Contained Databases and Oracle Multitenant: Advantages Compared
Oracle introduced multi-tenant databases in version 12c. SQL Server answered with container databases in version 2012....Read more

Why Is Penetration Testing Critical to the Security of the Organization?
While it is critical to build defenses against today’s advanced attacks, it is difficult to measure tool effectiveness...Read more

Learning more about the Nitro platform which will power VMware Cloud on AWS Outposts
Intro into Powering Next-Gen EC2 Instances: Deep Dive into the Nitro System by Anthony Liguori....Read more

Lessons learned from the many crypto hacks
Despite the impenetrable nature of the technology behind cryptocurrencies/blockchain, crypto investments are insecure...Read more

UK's data protection watchdog preps to 'get its hands dirty' with beta of regulatory sandbox
Scheme to test compliance of innovative products accepting applications until 24 May...Read more

The One-Two Punch of User and Device Trust
Combining MFA with device trust and access policies neutralizes the risks associated with compromise...Read more

Amazon to Create 800 Jobs in Austin for AWS, Amazon Business
Amazon today said that it plans to create an additional 800 tech jobs in Austin, Texas....Read more

40% of Organizations Not Doing Enough to Protect Office 365 Data
Companies could be leaving themselves vulnerable by not using third-party data backup tools, a new report finds....Read more

CIOs admit certificate-related outages routinely impact critical business applications and services
Certificate-related outages harm the reliability and availability of vital network systems and services...Read more

F5’s new delivery model leverages the AWS SaaS Enablement Framework
F5 Networks extends its portfolio with a new delivery model that leverages the AWS SaaS Enablement Framework...Read more

Office Depot fined millions for tricking customers into believing their PCs were infected with malware
Since 2012, consumers have been making complaints that Office Depot has been tricking people into buying gear & services...Read more

Facebook Stored Hundreds of Millions of User Passwords in Plain Text for Years
Hundreds of millions of FB users had their account passwords stored in plain text and searchable by FB employees...Read more

Preinstalled Android apps are harvesting and sharing your data
New research reveals that the bloatware preinstalled on many Android phones could do more than simply chew up storage....Read more