Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Webinar: Outsourced or In-House? How to Choose the Best Approach for Your Organization - 25 May 2022

We know why the cost of cyber attacks continues to rise (hybrid work, more sophisticated breaches, etc.). Today's hybrid work model requires a security approach that provides intelligent protection for environments, users, and devices. Which security model is right for your organization, considering the current threat landscape? In this webinar, Our Chief Information Officer, Wayson Vannatta, will discuss strategies that IT leaders can use develop the security approach to thrive in an ever-changing risk environment, without added complexity.

Is GDPR a priority for businesses in 2022?

Data privacy is a priority objective for businesses today, particularly after the European Union's General Data Protection Regulation (GDPR) became enforceable in 2018, as this law protects European citizens’ personal data and requires organizations to change some of their work processes.

Cyberattacks Targeting NFT Marketplaces and Cryptographic Aficionados

Everything technology touches gets a digital makeover and the creative space wouldn’t be the exception. Non-fungible tokens (NFTs) are virtual assets that represent objects influenced by art, music, games, and videos. You can only buy them online, likely with cryptocurrency. NFTs are generally encoded with the same underlying software as many cryptos. In fact, they are part of the Ethereum blockchain, a cryptocurrency, like bitcoin or dogecoin.

The 443 Security Simplified Podcast - Episode 196: Building Security Strategies with Matt Lee

In this special video edition of The 443 Security Simplified, we sit down for a chat with Matt Lee, Sr. Director of Security and Compliance at Pax8 and well-known cyber security educator, to discuss security strategies for MSPs and midsize enterprises in the face of a dynamic threat landscape. We cover everything from picking a framework to getting buy in from stakeholders and take a forward look at what future cyber regulations may look like to all organizations.

What cybersecurity challenges do SOCs face in the coming months?

A security operations center (SOC) is the centralized security team that deploys the tools needed to continuously monitor and improve an organization's security approach while also preventing, detecting, analyzing and responding to security alerts. You could say the SOC acts as the central command of an organization's security, bringing together its entire IT infrastructure, including its networks, devices and company data, both inside the corporate perimeter and outside.

Webinar: Outsourced Cybersecurity or In-House? How to Choose the Best Approach for Your Organization

The coronavirus pandemic created new challenges for businesses as they adapt to an operating model in which working from home has become the ‘new normal. In addition, threat actors constantly change their strategies, tools, and techniques. When their attacks become less effective, they look for new weaknesses to expose and move to.

Cybersecurity in education, key for 1 out of 10 partners

A few weeks ago, we reported how the new wave of phishing that uses new variants of COVID-19 as bait had hit the education sector hard. Many students at universities and colleges across the United States were victims of phishing attacks via emails pretending to be from administrators at their institutions.