Webinar, Zecurion Blog
Zecurion Webinar | Implementing a Powerful Defense against Insider Threats
Join us for an engaging and informative webinar as we dive deep into latest Insider Threats and the effective strategies to protect your organizations with Next generation Data Loss Prevention (DLP).
Read MoreFastPassCorp, Webinar
FastPass Webinar | Win the Battle against Social Engineering Attacks!
In this webinar, Finn Jensen, CEO of FastPassCorp, will share his insights on various social engineering attacks and explain why businesses need advanced solutions like FastPassCorp to prevent these threats.
Read MoreBfore.AI Blog, Webinar
Bfore.AI Webinar | Predictive Cybersecurity, Augmenting Protection Without Risk
Join the live webinar with Luigi Lenguito, Founder and CEO at Bfore.AI to discuss the future challenges with AI and threats, and how Bfore.AI use predictions to stop cyber crime.
Read MoreWebinar, Zecurion Blog
Zecurion Webinar | The Next Generation DLP: know more, risk less
Join the live webinar with Dr. Alexey Raevsky, MBA, Co-Founder and CEO at Zecurion to discover the Next Generation DLP concept and its difference to the classic ones, basing on Zecurion innovations.
Read MoreDeviceTotal Blog, Lansweeper Blog, Webinar
Live Webinar | Know your Devices Security Posture with Lansweeper & ArcusTeam
Attend this 30 minute webinar and learn how Lansweeper’s industry leading asset management platform coupled with ArcusTeam’s threat detection capabilities provides you with a full lifecycle attack surface management for all of your devices.
Read MoreAcunetix Blog, Webinar
Invicti Webinar | How to prevent a Hacker Attack on your website
Join this special webinar to learn from Invicti experts on how to prevent a hacker attack on your website. Website hacking is a result from the adoption of web-based technologies for conducting e-business. Hackers attack these vulnerable websites for a number of reasons which can go from stealing sensitive information to SEO purposes.
Read MoreAcunetix Blog, Webinar
Invicti Webinar | What is IAST and How does it work?
Join this special webinar to discover What is IAST and How does it work. Our specialist will be covering how DAST Solution can maximise the scanning capabilities through the use of the IAST methodology/Component.
Read MoreWebinar
Acunetix Webinar Recording | Find and Fix your Vulnerabilities with Acunetix
Watch Acunetix Webinar Recording | Find and Fix your Vulnerabilities with Acunetix
Read MoreFlexera Blog, Webinar
Webinar | New Release of InstallShield® 2021 Deep Dive
Join this webinar to learn more about how InstallShield gives your organization the ability to build one-click installers that are more modern than ever and refreshingly simple.
Read MoreDeviceTotal Blog, Webinar
ArcusTeam Webinar | 5 Powerful Tips to Prevent Threats from Connected Devices
DeviceTotal Blog, Webinar
ArcusTeam Webinar | Powerful Tips to Prevent Threats from Connected Devices
Join us at this live webcast with Dr. Carmit Yadin, Founder and CEO of ArcusTeam to learn important tips that every security professional can adopt to predict and eliminate future attacks with DeviceTotal.
Read MoreReflectiz Blog, Webinar
Reflectiz Webinar | The Next Gen Digital Security for Websites
The live webcast will showcase Reflectiz’s award winning technology that will help you protect your website from next generation threats, such as client-side attacks, web skimming, Magecart attacks, data breaches and privacy violations. Seamless. No Installation.
Read MoreFlexera Blog, Webinar
Webinar | Automate Application Readiness with AdminStudio
Join this informative session to learn how to automate the package analysis, testing and automatic package conversion to either MSIX, MSI or virtualization formats. Save IT Costs, Improve packaging productivity and increase application quality and reliability.
Read MoreReflectiz Blog, Webinar
Reflectiz Webinar | How to Keep Your e-Commerce Website Safe Before Cyber-Monday and Black-Friday
Our partner, Reflectiz, will held a special online e-commerce session to demonstrate ways to keep your shopping website protected from growing risks like web-skimmers and Magecart attacks.
Read MoreSilobreaker Blog, Webinar
Silobreaker Webinar | Using Unstructured Data to stay ahead of Emerging Threats
This virtual session will focus on how technology and unstructured web data can be used to stay one step ahead in this ever-changing threat landscape.
Read MoreLansweeper Blog, Webinar
Lansweeper Webinar | IT Discovery: A Critical First Step in IT Security
Adoption of Cloud, growing complexity of the IT environment, Work from home and more workloads introduce security risks. This requires that IT asset management must evolve beyond a centralized asset inventory and compliance solution.
Read MoreWebinar
Webinar | Application Management in a Virtualized World
This webinar will discuss the overall idea of Building and managing applications that are built for virtual environment.
Read MoreSureLog SIEM Blog, Webinar
Anet Webinar | Detecting external and internal threats to your organization with SureLog SIEM and be compliant with regulations
How SureLog provides accelerated detection and response to events in every application of the infrastructure. How SureLog provides advanced correlation across applications and devices
Read MoreISDecision Blog, Webinar
ISDecisions Webinar | Stop cyber-attacks with Multi-Factor Authentication
Join Kate Fleming, the Technical Sales Manager at IS Decisions, and find out how to stop cyber-attacks with Multi-Factor Authentication.
Read MoreReflectiz Blog, Webinar
Reflectiz Webinar | The Hidden Risks of Third-Party Apps on Websites
Join Idan Cohen, the CEO of Reflectiz to learn more about the invisible dangers of third-party apps on websites.
Read More