Articles

Recent Cybertalks

Threat Intelligence: Moving Towards Cyber Resilience in 2022

  Date: May 19, 2022Time: 9 a.m. CDT/5 p.m. EAT/7:30 p.m. ISTTopic: Threat Intelligence: Moving Towards Cyber Resilience in 2022 Watch Now Abstract: The COVID-19 pandemic forced businesses to accelerate their adoption of digital technologies, paving the way for malicious actors to target the critical IT infrastructures of enterprises, government, and healthcare providers. The ever-evolving…

Read article
Ethical Hacking: Emerging Technologies that Require Red Teamers

Date: April 29, 2022Time: 9:30 a.m. MDT/11:30 a.m. EDT/4:30 p.m. BST/9 p.m. ISTTopic: Ethical Hacking: Emerging Technologies that Require Red Teamers Watch Now Abstract: Thanks to emerging technologies like cloud computing, the Internet of Things, and blockchain, businesses have become more cost effective and efficient. However, these developments have also created new attack surfaces for…

Read article
What Is the Future of Cybersecurity
What Is the Future of Cybersecurity?

Date: April 28, 2022Time: 9 a.m. CDT/3 p.m. BST/7:30 p.m. ISTTopic: What Is the Future of Cybersecurity? Watch Now Abstract: With the increasing integration of digital technology into daily life, cyberthreats have become far more prevalent. Advanced cyberattacks are on the rise as organizations rush to incorporate innovative technologies into their business agendas and are…

Read article
Oriyomi Fowler
Skills, Trends, and Challenges in Modern Network Defense

Date: April 14, 2022Time: 11:30 a.m. EDT/4:30 p.m. BST/9 p.m. ISTTopic: Skills, Trends, and Challenges in Modern Network Defense Watch Now Abstract: Emerging technologies are transforming global network security environments and perimeter security. Advancements in cloud computing and storage, the Internet of Things, and remote access have challenged IT professionals to implement innovative and sustainable…

Read article
How addressing cybersecurity vulnerabilities can strengthen defenses
Why Addressing Cybersecurity Vulnerabilities Is a Top Priority

Date: April 12, 2022Time: 8 a.m. EDT/1 p.m. BST/5:30 p.m. ISTTopic: Why Addressing Cybersecurity Vulnerabilities Is a Top Priority Watch Now Abstract: All businesses need to be vigilant in protecting themselves against cybersecurity risks and vulnerabilities—though considering the ever-expanding list of cybersecurity vulnerabilities, enterprises may sometimes feel as if they are waging a losing battle.…

Read article
Understanding the Impact of the Log4j Zero-Day Vulnerability
Zero-Day Vulnerability Response: A Case Study of Log4j

Date: April 8, 2022Time: 8. a.m. MST/5 p.m. CEST/8:30 p.m. ISTTopic: Zero-Day Vulnerability Response: A Case Study of Log4j Watch Now Abstract: In December 2021, the discovery of a zero-day vulnerability in Apache Log4j, a Java-based logging framework, sent shockwaves through the security community. A zero-day vulnerability is a security flaw in a software product…

Read article
How to Upgrade Your Ethical Hacking Skills Every Year

Date: March 29, 2022Time: 11 a.m. EDT/3 p.m. GMT/8:30 p.m. ISTTopic: How to Upgrade Your Ethical Hacking Skills Every Year Watch NowAbstract: Ethical hacking is a crucial tool for protecting organizations’ digital assets and infrastructures, as it enables security gaps to be discovered and fixed before they are exploited. As part of red teams, ethical…

Read article
Satyavathi Divadari
Cloud Security: Best Practices for Securing Cloud Environments

Date: March 1, 2022Time: 8.00 a.m. EST / 1.00 P.M. GMT / 6:30 p.m. ISTTopic: Cloud Security: Best Practices for Securing Cloud Environments Watch Now Abstract: Businesses are rapidly adopting cloud infrastructures for information storage and business operations. Cloud environments enable seamless data exchange, boost productivity, are reliable, and reduce operational and overhead costs. Cloud…

Read article