Views Navigation

Event Views Navigation

Today

Warfare and Digital Identity – The Impact on the Digital Economy

Cyber Warfare is the silent war that is taking place without the public knowing about it. Cyber warfare has the potential to wreak havoc on people’s accounts, infrastructure and critical systems. With the changing cyber attack landscape, it is critical that organizations approach cyber risk methodically and invest in controls that protect their people and core assets. Join Miki Fukushima, Security Program Lead of Kobalt.io on June 15.

Going Passwordless: The Future of Cybersecurity

Increasing cyber threats and poor password hygiene continue to pose risks to organizations using passwords. Passwordless authentication strengthens security by eliminating risky password management practices and reducing attack vectors.

What SMBs Need to Know about Bill C-27?

In today’s economy, organization competitiveness depends on the ability to use digital innovation to harness the power of data. Data privacy and security have since become one of the defining social issues of our era.

Reducing Cybersecurity Risks with a Developer-first Security Approach

Cloud-based business creates efficiencies and cost-savings, but may also provide an attractive target for threat actors. Developers need to shut these doors and secure them using a developer-first security approach. Security testing can no longer be something done after the code is produced. Security needs to be integrated into every aspect of a DevSecOps approach to secure application development.

Fortifying Your Security Frontline with Awareness Training

Cyber security in the workplace has become increasingly critical as more organizations migrate to cloud services. As adoption of digital channels and work from home initiatives have grown exponentially, so too has the number of phishing attacks, business email frauds, data breaches and ransomware attacks.

Overcoming Data Privacy and Cybersecurity Challenges

Any business that is processing personal or sensitive information should appoint a Data Privacy Officer (DPO) to oversee compliance obligations, and protect the interests of their data subjects.

Role of GRC in Fraud and Breach Prevention for SMBs

As businesses scale to meet rising demands, getting a clear visibility of what is happening in your digital assets is vital. It is important to run continuous monitoring to effectively scan for a broad range of attacks, troubleshoot potential risks and secure your tech stack.

Business Email Compromise and Defense

As businesses scale to meet rising demands, getting a clear visibility of what is happening in your digital assets is vital. It is important to run continuous monitoring to effectively scan for a broad range of attacks, troubleshoot potential risks and secure your tech stack.

How vCISOs Help Optimize Your Cyberdefense

Organizations are facing a dangerous combination of mounting cybersecurity threats and a widening gap in the skills required to identify and combat them. A Virtual CISO can be a less costly solution.

Establishing Customer Trust through Compliance

Trust takes years to build, seconds to break, and forever to repair. Companies around the globe are challenged by increased regulatory requirements and consumer expectations for privacy protection. So, how can you demonstrate security, and build consumer trust through achieving compliance?