Addressing challenges in the cloud
Addressing challenges in the cloud
Addressing challenges in the cloud
Warfare and Digital Identity – The Impact on the Digital Economy
Cyber Warfare is the silent war that is taking place without the public knowing about it. Cyber warfare has the potential to wreak havoc on people’s accounts, infrastructure and critical systems. With the changing cyber attack landscape, it is critical that organizations approach cyber risk methodically and invest in controls...
Read MoreSOC2 for Startups: Preparation, Timing, Execution, Sustainment
In this rapid fire talk Michael Argast, Co-Founder and CEO of Kobalt.io, will discuss strategies on achieving SOC2 compliance and sustaining it to support your business success.
Read MoreReduce data breaches: Implement best practice web app security testing
Advancements over the last decade in web technologies have reshaped the software landscape and have evolved traditional desktop software into web applications. This transition has several advantages, but security has...
Read MoreHow not-for-profits should tackle cybersecurity
No matter the size of an organization, for-profit or not-for-profit, all businesses should be protected online by implementing cybersecurity measures. Compared to for-profits, not-for-profits may need a different security approach...
Read MoreSecurity Questionnaire and Compliance Webinar
If you’re selling to large enterprise, government or other regulated industries, you’ll have come across the dreaded “security questionnaire” or complex security contractual terms. It’s a chasm you need to cross in order to be able to close the deal and take your business to the next level, but for...
Read MoreCloud Security Best Practices
Michael Argast, Co-Founder and CEO of Kobalt Security Inc. joined Optimus Information to discuss common security challenges faced today and what businesses can do to minimize their risks.
Read MoreStrategies for Evaluating and Ensuring Code Security and Resiliency
There are numerous ways to evaluate the security of your code, applications and infrastructure - they are not all equal, and each has a role to play.
Read MoreBusiness Email Compromise and Fraud
Cyber attacks are coming fast and furious. Investigate three real-life cases of successful email compromises: self-discovered compromise, blackmail attempt, payment redirection. Gain insight into what defense strategies you can apply to your business.
Read More