Digital Events - Page 2
Automating your Security Operations Center (SOC) is a journey that starts by focusing on five key areas within the SOC that can be addressed and improved to best protect your organization.
Our panel discusses how government IT organizations can defeat the most common attack vectors while still letting users have access to the websites and tools they use on a daily basis.
Discover the business drivers and foundational pillars of financial services data center modernization and what it means to have a security-first design.
Join IBM's Jeffrey Labrador and James Alivihiera to find out how you can use cyber assessments, AI and innovative learning practices to get your high-stakes cybersecurity hiring right.
Discover why effective risk management practices offer a single quantitative threat assessment. The goal: a clear-eyed picture of where risk lies so that you to stay ahead in an increasingly competitive market.
Join eWEEK Senior Editor Sean Michael Kerner as he discusses what the California Consumer Privacy Act is and how it will it impact US vendors, its relationship to GDPR, and what controls and approaches are needed for compliance.
Visibility is a key challenge for cybersecurity teams, and without a holistic view, it’s nearly impossible to detect threats across every stage of the kill chain.
Plan to join us Aug. 8 for an #eWEEKchat about trends in new-generation mobility applications and development of applications and services--and whether Apple has stopped innovating or not.
Cloud service providers need a secure and reliable Linux platform that provides exceptional operational efficiencies, allowing them to consolidate a mix of multi-tenant workloads in a small footprint and deliver differentiated level of service to their clients.