Upcoming Events

Demo Friday: Streamlining Investigations with Cisco Visibility
2018-07-20 13:00 | 2018-07-20 14:00
We will demo how Visibility reduces mean time to resolve, using features leveraged from AMP for Endpoints, Threat Grid, Umbrella, and more.
...Read more

Extending NSX Data Center Networking & Security to Microsoft Azure with NSX CloudGetting More Out of NSX Webcasts w/ Dem
2018-07-24 14:00 | 2018-07-24 15:00
Lean: Current use cases and overall benefits of NSX Cloud; current capabilities of VMware NSX Cloud with Microsoft Azure, how to manage network functions and write security policies that apply to on-premises VMs and Azure workloads
...Read more

Demo Friday: Secure your data center workloads wherever they go: a Tetration overview and demo
2018-07-27 13:00 | 2018-07-27 14:00
Join Nirali Desai, Product Management and Tim Garner, Technical Marketing Engineer, as they take you through an overview and demo of Tetration.
...Read more

Context-Aware Micro-segmentation for Maximum Security
2018-07-31 14:00 | 2018-07-31 15:00
- How context-awareness expands micro-segmentation to give you more fine-grained visibility and control of your security policies - Enforcing security policies using Application and Protocol Identification
...Read more

Virtualization’s Hidden Gem – Application Security
2018-08-01 14:00 | 2018-08-01 15:00
How abstracting infrastructure from the applications running on top of it provides broader context and maximum visibility into an environment How enabling encryption of data at rest and micro-segmentation can help align security controls with application
...Read more

Building Security into the 3 Phases of Container Deployment
2018-08-02 13:00 | 2018-08-02 14:00
By outlining common security risks and practical use cases across every phase, this session helps security teams better understand how to efficiently manage security at the speed and scale of DevOps.
...Read more

Demo Friday: Secure Data Center: A First Look at the Cisco Validated Design
2018-08-03 13:00 | 2018-08-03 14:00
Learn how to create operational efficiency with flexible, integrated security. Learn how to secure business workflows against threats Learn best practices for data center protection that keeps your data center more secure and your business more productiv
...Read more

Check Point SMB Security
2018-08-15 11:00 | 2018-08-15 12:00

...Read more

WiFi's tougher WPA3 security is ready
WPA3 adds better encryption and safer smart homes....Read more

10 Leading Female CIOs
While women are still underrepresented in IT, quite a few of the world's largest organizations have female CIOs....Read more

5 signs you've been hit with an advanced persistent threat (APT)
Noticing odd network behavior? You could be the victim of an APT attack...Read more

What is a Chief Security Officer? Understanding this critical role
The CSO is responsible for the organization's entire security posture, both physical and cyber....Read more

Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices
Own the Router, Own the Traffic...Read more

The Hackers' Playbook How an embarrassing breach became a master class in cybersecurity
A 2017 cyberattack on the power grid in the US & abroad showed how eager hackers are to disrupt critical infrastructure...Read more

Don’t Give Away Historic Details About Yourself
Simple questions may be little more than an attempt at online engagement...Read more

Fortinet VPN Client Exposes VPN Creds, Palo Alto Firewalls Allow Remote Attacks
Fortinet & Palo Alto fixed security issues this week, with some bugs being quite intrusive and dangerous...Read more

6 steps for GDPR compliance
Failure to comply will be costly....Read more

Phishers Are Upping Their Game. So Should You.
Increasingly phishers are upping their game, polishing their copy to make the fake sites appear more legitimate...Read more

Postpone Inbox Procrastination
Worth reading...Read more

DevOps It's a decade since DevOps became a 'thing' – and people still don't know what it means
You can't buy or hire a mindset...Read more

6 missteps that could cost CISOs their jobs
Sure, a big preventable breach might easily cost a CISO his or her job. A few less obvious blunders could do the same....Read more

What is penetration testing? The basics and requirements
Here’s what it entails and tips for breaking into the role....Read more