Remove Architecture Remove Cybersecurity Remove Webinar
article thumbnail

Upcoming webinar: How a leading architecture firm approaches cybersecurity

Malwarebytes

On March 28, 2024, Malwarebytes CEO, Marcin Kleczynski, and Payette Associates Director of Information Technology, Dan Gallivan, will answer these questions and more in our live Byte into Security webinar. This Byte into Security webinar is a must for anyone eager to see how top-tier cybersecurity tactics are applied in real-world scenarios.

article thumbnail

Navigating the SEC’s Cybersecurity Disclosure Rules: One Year On

Security Boulevard

Securities and Exchange Commission (SEC)began enforcing new cybersecurity disclosure rules. Recognizing the critical need for transparency and robust cybersecurity measures, the U.S. As part of their fiduciary duties, boards play a key role in the oversight of risks from cybersecurity threats.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Get an Untrusted Security Advisor! Have Fun, Reduce Fail!

Anton on Security

If you need a TLDR, you will see that an untrusted cybersecurity advisor can be used for the majority of muse use cases (give me ideas and inspiration! What are some ideas for doing architecture in cases of X and Y constraints? Specifically, LLMs can be valuable “untrusted advisors” for cybersecurity, but only when used responsibly.

article thumbnail

Cybersecurity Snapshot: CISA Calls for Stamping Out Buffer Overflow Vulnerabilities, as Europol Tells Banks To Prep For Quantum Threat

Security Boulevard

Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) called buffer overflow vulnerabilities unforgivable defects that put national and economic security at risk. For more information about the threat from quantum computing: Is Quantum Computing a Cybersecurity Threat?

Banking 64
article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

article thumbnail

A week in security (March 18 – March 24)

Malwarebytes

Last week on Malwarebytes Labs: New Go loader pushes Rhadamanthys stealer Canada revisits decision to ban Flipper Zero Patch Ivanti Standalone Sentry and Ivanti Neurons for ITSM now 19 million plaintext passwords exposed by incorrectly configured Firebase instances Apex Legends Global Series plagued by hackers Tax scammer goes after small business (..)

article thumbnail

Webinar: Maximizing SOC Efficiency With Open and Agnostic Security Solutions

Security Boulevard

Don’t miss our upcoming panel webinar, “Open and Agnostic Security Solutions to Defend Against Modern Threats,” happening on November 29, 2023, at 10 AM PST/1 PM EST. Our panelists, Tony UV (CEO of VerSprite), David Barton (CTO of High Wire Networks), and Kevin Wilson (Sr.