Articles

Recent Cybertalks

Protecting the Cloud Computing Environment with CEP Shield against DDoS Attacks

Date: August 25, 2022Time: 9:30 a.m. CDT/10:30 a.m. EDT/8 p.m. ISTTopic: Protecting the Cloud Computing Environment with CEP Shield against DDoS Attacks Watch NowAbstract: Distributed Denial of Service (DDoS) attacks are emerging as one of the most concerning cyberthreats to cloud services. While organizations have benefited from cloud features such as the ability to store…

Read article
Creating Your Cybersecurity Career Roadmap: Essential Skills for Today’s Workplace

Date: July 1, 2022Time: 9 a.m. CDT/5 p.m. AST/7:30 p.m. ISTTopic: Creating Your Cybersecurity Career Roadmap: Essential Skills for Today’s Workplace Watch Now Abstract: In a world where technology is intertwined with routine activities, cybersecurity has become an integral part of daily life. Though cybersecurity careers are challenging and demanding, they remain an attractive prospect…

Read article
How CISOs Should Approach Critical Cloud Security Issues
How CISOs Should Approach Critical Cloud Security Issues

Date: June 30, 2022Time: 9:30 a.m. EDT/2:30 p.m. BST/7:00 p.m. ISTTopic: How CISOs Should Approach Critical Cloud Security Issues Watch Now Abstract: Cloud storage has become indispensable for many businesses, as it minimizes costs and improves overall efficiency. While cloud computing is a boon for enterprises, however, failing to ensure cloud security could eliminate all…

Read article
Does Remote Work Present a Major Cybersecurity Threat eccu
Does Remote Work Present a Major Cybersecurity Threat?

Date: June 29, 2022Time: 10 a.m. EDT/3 p.m. BST/7:30 p.m. ISTTopic: : Does Remote Work Present a Major Cybersecurity Threat? Watch Now Abstract: Not everyone has the cybersecurity skills or awareness to stay safe on the internet, where hackers often use sophisticated tactics to prey on unsuspecting users. This is especially problematic for employees who…

Read article
The Dos and Don’ts of API Security

Date: June 22, 2022Time: 9 a.m. MDT/4 p.m. BST/8:30 p.m. ISTTopic: : The Dos and Don’ts of API Security Watch Now Abstract: Cybercrime is on the rise, and no technology is immune to attacks by malicious actors. Application programming interfaces (APIs) are becoming more prevalent in cloud computing, the Internet of Things, and mobile applications,…

Read article
Cyberthreat Hunting and Intelligence in IoT Environments
Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments

Date: May 27, 2022 Time: 10 a.m. EDT/3 p.m. BST/7:30 p.m. IST Topic: Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments Watch Now Abstract: Cybersecurity is a never-ending fight. As security professionals develop advanced strategies to stop one attack, malicious hackers invent more sophisticated tactics for penetrating networks and covertly stealing confidential data.…

Read article
Threat Intelligence: Moving Towards Cyber Resilience in 2022

  Date: May 19, 2022Time: 9 a.m. CDT/5 p.m. EAT/7:30 p.m. ISTTopic: Threat Intelligence: Moving Towards Cyber Resilience in 2022 Watch Now Abstract: The COVID-19 pandemic forced businesses to accelerate their adoption of digital technologies, paving the way for malicious actors to target the critical IT infrastructures of enterprises, government, and healthcare providers. The ever-evolving…

Read article
Core Digital Forensics Skills for Cyber Investigations
Core Digital Forensics Skills for Investigating Cyber Incidents

Date: May 13, 2022Time: 10:30 a.m. EDT/3:30 p.m. BST/8 p.m. ISTTopic: Core Digital Forensics Skills for Investigating Cyber Incidents Watch Now Abstract: Digital advances have enabled malicious actors to penetrate networks even in secure environments. Law enforcement agencies and other organizations use digital forensics to trace the path of a cyberattack by analyzing vast amounts…

Read article
Ethical Hacking: Emerging Technologies that Require Red Teamers

Date: April 29, 2022Time: 9:30 a.m. MDT/11:30 a.m. EDT/4:30 p.m. BST/9 p.m. ISTTopic: Ethical Hacking: Emerging Technologies that Require Red Teamers Watch Now Abstract: Thanks to emerging technologies like cloud computing, the Internet of Things, and blockchain, businesses have become more cost effective and efficient. However, these developments have also created new attack surfaces for…

Read article