Articles

Cyber Talks

Understanding the Impact of the Log4j Zero-Day Vulnerability
Zero-Day Vulnerability Response: A Case Study of Log4j

Date: April 8, 2022Time: 8. a.m. MST/5 p.m. CEST/8:30 p.m. ISTTopic: Zero-Day Vulnerability Response: A Case Study of Log4j Watch Now Abstract: In December 2021, the discovery of a zero-day vulnerability in Apache Log4j, a Java-based logging framework, sent shockwaves through the security community. A zero-day vulnerability is a security flaw in a software product…

Read article
How to Upgrade Your Ethical Hacking Skills Every Year

Date: March 29, 2022Time: 11 a.m. EDT/3 p.m. GMT/8:30 p.m. ISTTopic: How to Upgrade Your Ethical Hacking Skills Every Year Watch NowAbstract: Ethical hacking is a crucial tool for protecting organizations’ digital assets and infrastructures, as it enables security gaps to be discovered and fixed before they are exploited. As part of red teams, ethical…

Read article
Satyavathi Divadari
Cloud Security: Best Practices for Securing Cloud Environments

Date: March 1, 2022Time: 8.00 a.m. EST / 1.00 P.M. GMT / 6:30 p.m. ISTTopic: Cloud Security: Best Practices for Securing Cloud Environments Watch Now Abstract: Businesses are rapidly adopting cloud infrastructures for information storage and business operations. Cloud environments enable seamless data exchange, boost productivity, are reliable, and reduce operational and overhead costs. Cloud…

Read article
How Can Continuous Automated Red Teaming Provide Scalability and Better Insights?

Date: February 24, 2022Time: 7.30 p.m ISTTopic: How Can Continuous Automated Red Teaming Provide Scalability and Better Insights? Watch Now Abstract: With the emergence of such concerns as new attack vectors, advanced technologies, and rapid digitization, the cyberthreat landscape is rapidly evolving. Organizations need to identify their attack surfaces to mitigate cyber risks and strengthen…

Read article
Why You Should Pursue a Cybersecurity Degree in 2022

Date: February 23, 2022Time: 8:30 a.m. PST/4:30 p.m. GMT/10 p.m. ISTTopic: Why You Should Pursue a Cybersecurity Degree in 2022 Watch Now Abstract: Although cybersecurity is the backbone of every organization’s defensive strategy, very few devote enough attention to it. A widespread lack of security awareness and the daunting cybersecurity skills gap increase the risks…

Read article
How Enterprises Can Secure Their Web Application Against Attacks

Date: February 22, 2022Time: 9 a.m. MST/8 a.m. PST/5 p.m. CEST/9:30 p.m. ISTTopic: How Enterprises Can Secure Their Web Application Against Attacks Watch Now Abstract: To effectively protect your organization’s web applications against cyberattacks, it is necessary to take a multidimensional approach. In this webinar, a panel of industry experts will discuss key measures that…

Read article
Implementing Effective Information Security Architecture
Implementing Effective Information Security Architecture for Organizations: A Roadmap

Date: February 16, 2022Time: 3 p.m. CET/ 9 a.m. EST/ 7:30 p.m. ISTTopic: Implementing Effective Information Security Architecture for Organizations: A Roadmap Watch Now Abstract: In today’s market, the success of an organization depends heavily on how it manages its information security architecture. No organization wants to be in a situation where its cybersecurity fails…

Read article
Starting a Career in Cybersecurity: Essential Skills for Today’s Professionals

Date: January 28 2022Time: 12 PM EST/ 6 PM CET/ 10.30 PM ISTTopic: Starting a Career in Cybersecurity: Essential Skills for Today’s Professionals Watch Now Abstract: Given that the threat landscape has increased in scope and remote workers are soft targets for hackers, organizations across the globe are looking to hire qualified information and cybersecurity…

Read article