Архив проектных документов

Новейшие темы:

Identify and Respond to Email Threats Faster with PhishER

Cybercriminals are always coming up with new, devious phishing techniques to trick your users. PhishFlip is a new PhishER feature that allows you to respond in real time and turn the tables on these threat actors. With PhishFli...

Смотреть вебинар для просмотра по запросу

Critical Considerations When Choosing Your Security Awareness Training Vendor

It’s become more and more evident to organisations that new-school security awareness training is an absolute requirement for managing the ongoing problem of social engineering. But how do you develop a program that will delive...

Смотреть отчет

KnowBe4 Security Awareness Training Demo

Email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defence. Watch this on-demand demonstration of how KnowBe4 introduces a new-school approach to Security Awareness Training...

Узнать подробнее

Networking with the Enemy: Understanding the Psychology of Social Engineering

Social engineering is a growing threat in today's digital world, where attackers use psychological manipulation to gain access to sensitive information. This talk will explore the psychology behind social engineering, and disc...

Смотреть вебинар для просмотра по запросу

Phishing Benchmark Report

As a security leader, you’re faced with a tough choice. Even as you increase your budget for sophisticated security software, your exposure to cybercrime keeps going up! IT security seems to be a race between effective techno...

Смотреть отчет

Communicating Cybersecurity Effectively in Your Organisation

Every industry has unique jargon and buzzwords, and cybersecurity is no different. The challenge faced by IT professionals across the globe is how to engage employees effectively in their role in making better online decisions....

Смотреть вебинар для просмотра по запросу

The CISO’s Guide: Attack Surface Management (ASM) - Episode 1

Attack Surface Management is not limited to the surface! Today, the stock of vulnerabilities has grown so fast that systematic correction of CVEs or misconfigurations is no longer possible. Continuing to struggle manually th...

Смотреть электронную книгу

UNDERSTANDING AND IMPROVING YOUR CYBERSECURITY WITH MITRE ATT&CK:

MITRE ATT&CK to the rescue! Today, prioritizing 200,000+ vulnerabilities is humanly impossible. Lucky for us cybersec pros, the MITRE ATT&CK Framework has become the go-to standard, providing a structured approach to ...

Смотреть проектный документ

Cost savings and business benefits enabled by the CipherTrust Data Security Platform

As the IT landscape becomes increasingly complex, organizations must rethink their data security strategy to protect valuable customer data and remain compliant, to avoid putting their organizations at risk both financially and...

Смотреть проектный документ

CFO Insights: In Another Year of Uncertainty, CFOs Become Paragons of Business Resiliency

With high inflation, rising interest rates, ongoing supply disruptions, persistent talent shortages, and increasing costs across all business areas, no company is the same as it was three years ago. Every challenge so far has c...

Смотреть проектный документ
Регистрируйтесь для получения нашей рассылки
Самые важные новости бесплатно по электронной почте