Digital Events
Join Sean Michael Kerner and Gus Evangelakos of XM Cyber, as they discuss how businesses can use breach and attack simulation to improve security, help meet compliance requirements, and secure cloud and hybrid environments.
Author and cybersecurity professional Dale Meredith highlights the first six steps you should take when a real incident happens.
Explore the findings of the 2019 State of Encryption Research Report, which examines the use of encryption and access controls, and better understand how organizations currently use these technologies.
Explore the nature of file security and how you can quickly and easily secure sensitive data containing PII and PHI spread over a variety of systems.
Join eWEEK Market Expert Aaron Goldberg and Ben Newton of Sumo Logic as they explore the way data and analytic can improve your IT operations and much more.
SQL Server 2008/R2 is nearing the end of Microsoft’s extended service period. We’ll cover some of the reasons that business are slow to upgrade from older releases of SQL Server, as well as the consequences of running on unsupported releases.
With a foundation of signatures and a light framework of behaviors of observed attacks, AV and NGAV tout a way to stop attacks. But a simple glance at the news shows these tools are not successful. Businesses need more to solve for the growing cyber security risk.
Join Chris Preimesberger, Editor-in-Chief of e WEEK, and experts from Sophos, as they highlight the emerging cyberattack trends that will be prevalent throughout 2019 and beyond, as well as how companies can protect themselves.
Michael Pastore
|
Updated
How can security professionals understand what users are really doing with their access privileges, and what risks they might be exposed to as a result?
Getting your data center strategy right results in a scalable, cost-effective asset that can drive digital business, enable innovation, and drive revenue growth.