Remove Architecture Remove Risk Remove Technology Remove Webinar
article thumbnail

20 Years of SIEM Webinar Q&A

Anton on Security

I recently did this fun SANS webinar titled “Anton Chuvakin Discusses “20 Years of SIEM?—?What’s What’s Next?”” (the seemingly self-centered title was suggested by CardinalOps who organized the webinar). As it is common for SANS webinars , we got a lot of great questions that I feel like re-answering here for posterity.

article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Strengthening Cyber Resilience: A Milestone Partnership

Security Boulevard

Through this partnership, we aim to provide comprehensive solutions that not only mitigate risks but also foster a culture of proactive defense and resilience, and allow organizations to move their businesses forward with confidence. Don’t miss our upcoming threat intelligence webinar!

article thumbnail

The Bridge to Zero Trust

CyberSecurity Insiders

This is why governments and organizations around the world are implementing a zero trust security framework to reduce the risk of attacks while protecting resources and data. You also have to navigate reputational damage, lost revenue, and the potential for fines and sanctions from regulatory agencies.

article thumbnail

When You Can’t Add Cybersecurity Staff Build Cyber-Resiliency Instead

Security Boulevard

It isn’t always possible to hire new staff or implement new technology, so one solution is to build resilience into existing infrastructure. Additionally, it’s important to consider all the different types and locations of threats and then think critically when designing or redesigning IT architectures and systems.

article thumbnail

Four Tenets of Zero Trust Workload Protection

Security Boulevard

We must admit that most of our current security technology has holes. In fact, an underlying purpose of security is to enable trust by reducing risks. Chief Technology Officer, Fortune 100 Tech Company. . i] Zero Trust Architecture , NIST Special Publication 800-207, August 2020. [ii] Never Trust – Always Verify.

article thumbnail

Next-Generation Firewalls: A comprehensive guide for network security modernization

CyberSecurity Insiders

Next-Generation Firewalls (NGFWs), free from legacy technology constraints, take advantage of significant advancements in computational power, memory, and storage. UTMs, however, include these features plus additional technologies such as wireless security, URL filtering, email security, VPNs, and web application firewalls.