Your cyber intelligence source

Securing Data in the Cloud: Advanced Strategies for Cloud Application Security

Discussing the current trends in cloud security, focusing on the challenges of hybrid environments

image image image
WATCH ON DEMAND

How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions

Streamlining the lifecycle of joiners, movers, and leavers using no-code automation

image image image
WATCH ON DEMAND

Beyond Cloud Security Posture Management:

Validating Cloud Effectiveness with Attack Simulation

image image image image
WATCH ON DEMAND

Expert reports

When you need a background briefing on a topic, or a more in-depth update on a particular issue that is causing you a problem, there is sure to be an SC Whitepaper to meet your needs. SC Whitepapers extend from wide-ranging overviews to in-depth analysis of specific issues of interest to cyber-security professionals. Our Whitepapers are written by authoritative acknowledged experts in their fields and range from Access to Zero days, with insider threats, ransomware, DDoS, breaches, planning, remediation, behavioural analysis, regulation (including GDPR) and updates on specific threats among topics covered. We work in cooperation with selected commercial partners, ensuring that the information provided is independent, unbiased and authoritative.

Webinars

Our Webinars are truly informative, so that you will come away knowing more about the topic than you did before, and ideally with actionable information that you can apply in your organisation. Editorially independent moderators will quiz expert presenters and panellists, as well as asking questions from listeners to tease out the answers that you need to improve your performance. Listen today, engage with the experts, ask a question, and improve your understanding of the issues that matter to you.

Upcoming

No events found.

Past

Securing Data in the Cloud: Advanced Strategies for Cloud Application Security

Discussing the current trends in cloud security, focusing on the challenges of hybrid environments

In this live webinar, join security specialists from OPSWAT to discuss the current trends in cloud security, focusing on the challenges of hybrid environments, including diminished visibility and weakened threat detection.

image image image

How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions

Streamlining the lifecycle of joiners, movers, and leavers using no-code automation

The process of onboarding new employees and quickly removing departing staff profiles can be both time-consuming and labour-intensive.
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.

Key takeaways:
  • Understanding the importance of securing the joiners, movers and leavers process
  • Exploring successful attacks that occurred due to errors in managing these transitions
  • Discover which advanced controls can be utilized
image image image

Beyond Cloud Security Posture Management:

Validating Cloud Effectiveness with Attack Simulation

image image image image