Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Webinar: Elevating Your MSP Security Practice with a Unified Security Platform - 28 Apr 2022

You’re tired of struggling with disjointed security information, incomplete integrations, and too much time and energy spent with multiple security vendors. These aren’t minor headaches of a managed services business, they ultimately drain efficiency and profits, and many are considering vendor consolidation as the answer.

Proactive Compliance Verification for Network Security

Regulatory compliance can cost teams valuable time and money. Forward Enterprise's security posture verification can relieve this burden and prove that your network behavior conforms with corporate policy intent in real-time. In this demonstration, Technical Solutions Architect, Glen Turner shows us how operators can use Forward to prove the network meets PCI DSS regulatory requirements.

Lessons From Billions of Breached Records by Troy Hunt of https://haveibeenpwned.com

Security flaws, hackers and data breaches are the new normal. It’s not just those of us in the industry facing these foes every single day; it’s everyone. Whether you’re online or offline, you simply cannot exist today without your personal information being digitized in systems which are often left vulnerable and exploited at the whim of attackers. But who are these people — the ones who seek to break through our defenses and exploit our data? And how are they continually so effective at doing so, despite our best efforts?

Innovation lessons we can learn from hackers

In 2022, Cyber Security is no longer about protecting secrets. It is about our way of life that relies on digital technology everywhere: from clouds to smartphones, from medical facilities to stock markets, and everything in between. In the past 2 years, threat actors have innovated faster than ever before, even using “growth hacking” tricks to increase the impact of their criminal enterprises. At the same time, our own connected lifestyle and digital footprint keep changing at breakneck speeds. How can we prepare for what comes next? By learning from hackers! @Keren Elazari — security researcher, TED speaker, and friendly hacker — joins us for a conversation on emerging security threats, new attack vectors and techniques, and innovation lessons we can learn from hackers.

#BigPictureCyber Town Hall With Michael McLaughlin, UMD ARLIS | 4/27/22 | NeoSystems

NeoSystems #BigPictureCyber Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly #BigPictureCyber Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, cybersecurity news, how to prepare for CMMC certification, and the latest updates from the CMMC AB.