Your cyber intelligence source

Webinars

Watch

Organisations around the globe have been quietly preparing to meet the GDPR requirements for the May 25th deadline. Many important changes such as incorporating the concept of “data protection by design” and focusing on accountability and operational controls are happening behind the scenes.

  • image
    Stephen Twynam Senior Sales Engineer, Citrix
  • image
    Florin Lazurca Senior technical marketing manager, security, Citrix
  • image
    Tony Morbin Editor-in-Chief, SC Media UK
Watch

Organisations spent a combined £123 billion on cybersecurity in 2016 and 2017. During the same period, 66 percent of organisations experienced and average of five or more data breaches. A larger security budget simply won’t solve the cyber security problem. An entirely new approach is required — Zero Trust Security.

  • image
    Barry Scott CTO – EMEA, Centrify
Watch

One way cybercriminals obtain the resources and connections they need to engage in their activities is through the Internet underground or “dark web.” Definitions of the Internet underground may vary, but to Secureworks, it means the collection of Internet forums, digital shop fronts and chat rooms that cybercriminals use to form alliances, trade tools and techniques, and sell compromised data that can include banking details, personally identifiable information and other content.

  • MM
    Mike McLellan Senior Security Researcher, Secureworks Counter Threat Unit™ (CTU)
Watch

Your email system is usually your weakest point of entry for ransomware attackers with 98% of phishing malware entering  via email.  How can you close this backdoor to your systems and avoid becoming a victim? Listen to our webinar to identify your weakspots – and discover how to strengthen them.

  • image
    Steven Malone Director of Product Management for security services, Mimecast