Implementing Security Solutions
Technologies and practices for applying security principles and solutions.
-
Prevent Helpdesk Social Engineering with HYPR Affirm
Helpdesk Social Engineering is a tactic used by cybercriminals to exploit human vulnerabilities within an organization's helpdesk or support system.
Read More » -
AI: The New Attack Surface – The New Cybersecurity Risks Presented by AI Adoption
AI introduces new cybersecurity risks that organizations must address to safeguard their data and systems.
Read More » -
Secure Your Business Network with NordLayer’s Cloud Firewall
Cloud Firewalls play a crucial role in safeguarding sensitive information, maintaining compliance with regulations, and ensuring the availability and performance…
Read More » -
Remote Work Cybersecurity: Tips for Protecting Your Business and Employees
While remote work offers flexibility and convenience, it also poses significant cybersecurity risks that individuals and organizations need to be…
Read More » -
What is Business Email Compromise (BEC)?
Business email compromise (BEC), also known as email fraud, is one of cybersecurity’s costliest and least understood threats.
Read More » -
Introduction to AWS Network Firewall
AWS Network Firewall provides organizations using AWS with a centralized method to implement security measures and policies across VPCs and…
Read More » -
Harness power of IAM policies & rein in permissions w/Access Analyzer
Explore the power of IAM policies and discover how to use IAM Access Analyzer to set, verify, and refine permissions.
Read More » -
Threat Detection and Incident Response using Cloud-native Services
In this session, explore how cloud-native services can be used to support threat detection and incident response processes in AWS…
Read More » -
AWS data protection: Using locks, keys, signatures, and certificates
AWS offers a broad array of cryptographic tools and PKI platforms to help you navigate your data protection and digital…
Read More » -
How to Choose the Best Endpoint Protection Platform
Endpoint Protection refers to the security measures and technologies implemented to protect endpoints, such as desktops, laptops, smartphones, and servers,…
Read More »