FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

How Do Hackers Blend In So Well? Learn Their Tricks in This Expert Webinar

By: The Hacker News β€” May 24th 2024 at 11:49
Don't be fooled into thinking that cyber threats are only a problem for large organizations. The truth is that cybercriminals are increasingly targeting smaller businesses, and they're getting smarter every day. Join our FREE webinar "Navigating the SMB Threat Landscape: Key Insights from Huntress' Threat Report," in which Jamie Levy β€” Director of Adversary Tactics at Huntress, a renowned
☐ β˜† βœ‡ The Hacker News

CensysGPT: AI-Powered Threat Hunting for Cybersecurity Pros (Webinar)

By: The Hacker News β€” May 10th 2024 at 12:52
Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge are using it to outsmart increasingly advanced cyber threats. Join us for an exciting webinar, "The Future of Threat Hunting is Powered by Generative AI," where you'll explore how AI tools are shaping the future of cybersecurity defenses. During the session, Censys Security Researcher Aidan Holland will
☐ β˜† βœ‡ The Hacker News

Expert-Led Webinar - Uncovering Latest DDoS Tactics and Learn How to Fight Back

By: The Hacker News β€” May 3rd 2024 at 12:53
In today's rapidly evolving digital landscape, the threat of Distributed Denial of Service (DDoS) attacks looms more significant than ever. As these cyber threats grow in sophistication, understanding and countering them becomes crucial for any business seeking to protect its online presence. To address this urgent need, we are thrilled to announce our upcoming webinar, "Uncovering Contemporary
☐ β˜† βœ‡ The Hacker News

Webinar: Learn How to Stop Hackers from Exploiting Hidden Identity Weaknesses

By: The Hacker News β€” April 10th 2024 at 09:02
We all know passwords and firewalls are important, but what about the invisible threats lurking beneath the surface of your systems? Identity Threat Exposures (ITEs) are like secret tunnels for hackers – they make your security way more vulnerable than you think. Think of it like this: misconfigurations, forgotten accounts, and old settings are like cracks in your digital fortress walls. Hackers
☐ β˜† βœ‡ The Hacker News

New Webinar: Avoiding Application Security Blind Spots with OPSWAT and F5

By: The Hacker News β€” March 28th 2024 at 12:43
Considering the ever-changing state of cybersecurity, it's never too late to ask yourself, "am I doing what's necessary to keep my organization's web applications secure?" The continuous evolution of technology introduces new and increasingly sophisticated threats daily, posing challenges to organizations all over the world and across the broader spectrum of industries striving to maintain
☐ β˜† βœ‡ The Hacker News

Generative AI Security - Secure Your Business in a World Powered by LLMs

By: The Hacker News β€” March 20th 2024 at 11:27
Did you know that 79% of organizations are already leveraging Generative AI technologies? Much like the internet defined the 90s and the cloud revolutionized the 2010s, we are now in the era of Large Language Models (LLMs) and Generative AI. The potential of Generative AI is immense, yet it brings significant challenges, especially in security integration. Despite their powerful capabilities,
☐ β˜† βœ‡ The Hacker News

Join Our Webinar on Protecting Human and Non-Human Identities in SaaS Platforms

By: The Hacker News β€” March 13th 2024 at 10:33
Identities are the latest sweet spot for cybercriminals, now heavily targeting SaaS applications that are especially vulnerable in this attack vector. The use of SaaS applications involves a wide range of identities, including human and non-human, such as service accounts, API keys, and OAuth authorizations. Consequently, any identity in a SaaS app can create an opening for cybercriminals to
☐ β˜† βœ‡ The Hacker News

Building Your Privacy-Compliant Customer Data Platform (CDP) with First-Party Data

By: The Hacker News β€” February 28th 2024 at 12:02
In today's digital era, data privacy isn't just a concern; it's a consumer demand. Businesses are grappling with the dual challenge of leveraging customer data for personalized experiences while navigating a maze of privacy regulations. The answer? A privacy-compliant Customer Data Platform (CDP). Join us for a transformative webinar where we unveil Twilio Segment's state-of-the-art CDP.
☐ β˜† βœ‡ The Hacker News

Learn How to Build an Incident Response Playbook Against Scattered Spider in Real-Time

By: The Hacker News β€” February 20th 2024 at 10:53
In the tumultuous landscape of cybersecurity, the year 2023 left an indelible mark with the brazen exploits of the Scattered Spider threat group. Their attacks targeted the nerve centers of major financial and insurance institutions, culminating in what stands as one of the most impactful ransomware assaults in recent memory.  When organizations have no response plan in place for such an
☐ β˜† βœ‡ The Hacker News

New Webinar: 5 Steps to vCISO Success for MSPs and MSSPs

By: The Hacker News β€” February 7th 2024 at 10:38
2024 will be the year of the vCISO. An incredible 45% of MSPs and MSSPs are planning to start offering vCISO services in 2024. As an MSP/MSSP providing vCISO services, you own the organization’s cybersecurity infrastructure and strategy. But you also need to position yourself as a reliable decision-maker, navigating professional responsibilities, business needs and leadership
☐ β˜† βœ‡ The Hacker News

Webinar: The Art of Privilege Escalation - How Hackers Become Admins

By: The Hacker News β€” January 17th 2024 at 10:59
In the digital age, the battleground for security professionals is not only evolving, it's expanding at an alarming rate. The upcoming webinar, "The Art of Privilege Escalation - How Hackers Become Admins," offers an unmissable opportunity for IT security experts to stay ahead in this relentless cyber war. Privilege escalation - the term might sound benign, but in the hands of a skilled hacker,
☐ β˜† βœ‡ The Hacker News

Webinar – Leverage Zero Trust Security to Minimize Your Attack Surface

By: Newsroom β€” January 8th 2024 at 09:01
Digital expansion inevitably increases the external attack surface, making you susceptible to cyberthreats. Threat actors increasingly exploit the vulnerabilities stemming from software and infrastructure exposed to the internet; this ironically includes security tools, particularly firewalls and VPNs, which give attackers direct network access to execute their attacks. In fact, Gartner&
☐ β˜† βœ‡ The Hacker News

Stop Identity Attacks: Discover the Key to Early Threat Detection

By: The Hacker News β€” November 28th 2023 at 10:24
Identity and Access Management (IAM) systems are a staple to ensure only authorized individuals or entities have access to specific resources in order to protect sensitive information and secure business assets. But did you know that today over 80% of attacks now involve identity, compromised credentials or bypassing the authentication mechanism? Recent breaches at MGM and Caesars have
☐ β˜† βœ‡ The Hacker News

Discover 2023's Cloud Security Strategies in Our Upcoming Webinar - Secure Your Spot

By: The Hacker News β€” November 17th 2023 at 10:30
In 2023, the cloud isn't just a technologyβ€”it's a battleground. Zenbleed, Kubernetes attacks, and sophisticated APTs are just the tip of the iceberg in the cloud security warzone. In collaboration with the esteemed experts from Lacework Labs, The Hacker News proudly presents an exclusive webinar: 'Navigating the Cloud Attack Landscape: 2023 Trends, Techniques, and Tactics.' Join us for an
☐ β˜† βœ‡ The Hacker News

Webinar: Kickstarting Your SaaS Security Strategy & Program

By: The Hacker News β€” November 8th 2023 at 09:18
SaaS applications make up 70% of total company software usage, and as businesses increase their reliance on SaaS apps, they also increase their reliance on those applications being secure. These SaaS apps store an incredibly large volume of data so safeguarding the organization's SaaS app stack and data within is paramount. Yet, the path to implementing an effective SaaS security program isΒ notΒ 
☐ β˜† βœ‡ The Hacker News

New Webinar: 5 Must-Know Trends Impacting AppSec

By: The Hacker News β€” October 30th 2023 at 12:09
Modern web app development relies on cloud infrastructure and containerization. These technologies scale on demand, handling millions of daily file transfers – it's almost impossible to imagine a world without them. However, they also introduce multiple attack vectors that exploit file uploads when working with public clouds, vulnerabilities in containers hosting web applications, and many other
☐ β˜† βœ‡ The Hacker News

Webinar: Locking Down Financial and Accounting Data β€” Best Data Security Strategies

By: The Hacker News β€” October 17th 2023 at 11:43
Financial data is much more than just a collection of numbers; it is a crucial component of any business and a prime target for cybercriminals. It's important to understand that financial records can be a veritable treasure trove for digital pirates. A security breach not only puts customers' personal information in jeopardy but also enables fraudsters to drain company funds and exploit clients.
☐ β˜† βœ‡ The Hacker News

Webinar β€” AI vs. AI: Harnessing AI Defenses Against AI-Powered Risks

By: The Hacker News β€” September 25th 2023 at 11:41
Generative AI is a double-edged sword, if there ever was one. There is broad agreement that tools like ChatGPT are unleashing waves of productivity across the business, from IT, to customer experience, to engineering. That's on the one hand.Β  On the other end of this fencing match: risk. From IP leakage and data privacy risks to the empowering of cybercriminals with AI tools, generative AI
☐ β˜† βœ‡ The Hacker News

Way Too Vulnerable: Join this Webinar to Understand and Strengthen Identity Attack Surface

By: The Hacker News β€” September 5th 2023 at 11:56
In today's digital age, it's not just about being online but how securely your organization operates online. Regardless of size or industry, every organization heavily depends on digital assets. The digital realm is where business takes place, from financial transactions to confidential data storage. While organizations have quickly adopted tools like Multi-Factor Authentication (MFA),
☐ β˜† βœ‡ The Hacker News

Learn How Your Business Data Can Amplify Your AI/ML Threat Detection Capabilities

By: The Hacker News β€” August 25th 2023 at 11:49
In today's digital landscape, your business data is more than just numbersβ€”it's a powerhouse. Imagine leveraging this data not only for profit but also for enhanced AI and Machine Learning (ML) threat detection. For companies like Comcast, this isn't a dream. It's reality. Your business comprehends its risks, vulnerabilities, and the unique environment in which it operates. No generic,
☐ β˜† βœ‡ The Hacker News

Catching the Catphish: Join the Expert Webinar on Combating Credential Phishing

By: The Hacker News β€” August 15th 2023 at 07:31
Is your organization constantly under threat from credential phishing? Even with comprehensive security awareness training, many employees still fall victim to credential phishing scams. The result? Cybercriminals gaining immediate and unhindered access to sensitive data, email accounts, and other applications. But what if you could outsmart these criminals and protect your organization? JoinΒ 
☐ β˜† βœ‡ The Hacker News

Webinar - Making PAM Great Again: Solving the Top 5 Identity Team PAM Challenges

By: The Hacker News β€” August 4th 2023 at 11:06
Privileged Access Management (PAM) solutions are widely acknowledged as the gold standard for securing critical privileged accounts. However, many security and identity teams face inherent obstacles during the PAM journey, hindering these solutions from reaching their full potential. These challenges deprive organizations of the resilience they seek, making it essential to address them
☐ β˜† βœ‡ The Hacker News

Webinar: Riding the vCISO Wave: How to Provide vCISO Services

By: The Hacker News β€” July 31st 2023 at 11:50
Demand for Virtual CISO services is soaring. According to Gartner, the use of vCISO services among small and mid-size businesses and non-regulated enterprises was expected to grow by a whopping 1900% in just one year, from only 1% in 2021 to 20% in 2022! Offering vCISO services can be especially attractive for MSPs and MSSPs. By addressing their customers’ needs for proactive cyber resilience,
☐ β˜† βœ‡ The Hacker News

Defend Against Insider Threats: Join this Webinar on SaaS Security Posture Management

By: The Hacker News β€” July 14th 2023 at 11:08
As security practices continue to evolve, one primary concern persists in the minds of security professionalsβ€”the risk of employees unintentionally or deliberately exposing vital information. Insider threats, whether originating from deliberate actions or accidental incidents, pose a significant challenge to safeguarding sensitive data. To effectively address insider risks, organizations must
☐ β˜† βœ‡ The Hacker News

Webinar - Mastering API Security: Understanding Your True Attack Surface

By: The Hacker News β€” June 13th 2023 at 10:50
Believe it or not, your attack surface is expanding faster than you realize. How? APIs, of course! More formally known as application programming interfaces, API calls are growing twice as fast as HTML traffic, making APIs an ideal candidate for new security solutions aimed at protecting customer data, according to Cloudflare. According to the "Quantifying the Cost of API Insecurity" report, US
☐ β˜† βœ‡ The Hacker News

Zero Trust + Deception: Join This Webinar to Learn How to Outsmart Attackers!

By: The Hacker News β€” May 18th 2023 at 12:05
Cybersecurity is constantly evolving, but complexity can give hostile actors an advantage. To stay ahead of current and future attacks, it's essential to simplify and reframe your defenses. Zscaler Deception is a state-of-the-art next-generation deception technology seamlessly integrated with the Zscaler Zero Trust Exchange. It creates a hostile environment for attackers and enables you to track
☐ β˜† βœ‡ The Hacker News

Join Our Webinar: Learn How to Defeat Ransomware with Identity-Focused Protection

By: The Hacker News β€” May 8th 2023 at 13:31
Are you concerned about ransomware attacks? You're not alone. In recent years, these attacks have become increasingly common and can cause significant damage to organizations of all sizes. But there's good news - with the right security measures in place, such as real-time MFA and service account protection, you can effectively protect yourself against these types of attacks. That's why we're
☐ β˜† βœ‡ The Hacker News

Tour of the Underground: Master the Art of Dark Web Intelligence Gathering

By: The Hacker News β€” April 17th 2023 at 11:36
The Deep, Dark Web – The Underground – is a haven for cybercriminals, teeming with tools and resources to launch attacks for financial gain, political motives, and other causes. But did you know that the underground also offers a goldmine of threat intelligence and information that can be harnessed to bolster your cyber defense strategies? The challenge lies in continuously monitoring the right
☐ β˜† βœ‡ The Hacker News

Webinar: Tips from MSSPs to MSSPs – Building a Profitable vCISO Practice

By: The Hacker News β€” April 14th 2023 at 07:13
In today's fast-paced and ever-changing digital landscape, businesses of all sizes face a myriad of cybersecurity threats. Putting in place the right people, technological tools and services, MSSPs are in a great position to ensure their customers' cyber resilience.Β  The growing need of SMEs and SMBs for structured cybersecurity services can be leveraged by MSPs and MSSPs to provide strategic
☐ β˜† βœ‡ The Hacker News

Deep Dive Into 6 Key Steps to Accelerate Your Incident Response

By: The Hacker News β€” March 31st 2023 at 11:47
Organizations rely onΒ Incident responseΒ to ensure they are immediately aware of security incidents, allowing for quick action to minimize damage. They also aim to avoid follow on attacks or future related incidents. The SANS Institute provides research and education on information security. In the upcoming webinar, we’ll outline, in detail, six components of a SANS incident response plan,
☐ β˜† βœ‡ The Hacker News

Expert-Led Webinar: Learn Proven Strategies to Secure Your Identity Perimeter

By: The Hacker News β€” April 8th 2023 at 05:05
The stakes are high when it comes to cybersecurity. No longer are we dealing with unskilled hackers trying to break into corporate systems with brute force. Today, cybercriminals are using highly sophisticated methods like social engineering, spear phishing, and BEC to target users directly and log in with valid credentials. This is why the identity perimeter has become a critical battleground
☐ β˜† βœ‡ The Hacker News

How to Tackle the Top SaaS Challenges of 2023

By: The Hacker News β€” February 24th 2023 at 14:01
Are you prepared to tackle the top SaaS challenges of 2023? With high-profile data breaches affecting major companies like Nissan and Slack, it's clear that SaaS apps are a prime target for cyberattacks. The vast amounts of valuable information stored in these apps make them a goldmine for hackers. But don't panic just yet. With the right knowledge and tools, you can protect your company's
☐ β˜† βœ‡ The Hacker News

Webinar β€” A MythBusting Special: 9 Myths about File-based Threats

By: The Hacker News β€” February 15th 2023 at 13:46
Bad actors love to deliver threats in files. Persistent and persuasive messages convince unsuspecting victims to accept and open files from unknown sources, executing the first step in a cyber attack.Β  This continues to happen whether the file is an EXE or a Microsoft Excel document. Far too often, end users have an illusion of security, masked by good faith efforts of other users and (
☐ β˜† βœ‡ The Hacker News

Webinar: Learn How to Comply with New Cyber Insurance Identity Security Requirements

By: The Hacker News β€” February 9th 2023 at 13:11
Have you ever stopped to think about the potential consequences of a cyberattack on your organization? It's getting more intense and destructive every day, and organizations are feeling the heat. That's why more and more businesses are turning toΒ cyber insuranceΒ to find some much-needed peace of mind. Imagine, in the unfortunate event of a successful security breach or ransomware attack, the
☐ β˜† βœ‡ Naked Security

You’re invited! Join us for a live walkthrough of the β€œFollina” story…

By: Paul Ducklin β€” June 13th 2022 at 16:28
Live demo, plain English, no sales pitch, just a chance to watch an attack dissected in safety. Join us if you can!

❌