-
Top 5 Data Protection Gaps in Office 365 – Webinar
Office 365 offers basic protection to deal with some of the things that could damage your data, but there are things it doesn’t protect you from, and there are side effects to some of the optional protection features. An examination of improving data protection. Sponsored by Druva. Continue Reading
-
Web & Email Isolation: Why It Matters to Secure Your Organization and End Users – Webinar
Using web and email isolation technology to ensure the security of critical data, financial systems and other assets. Sponsored by Proofpoint and SecureWorld. Continue Reading
-
Adding Third-Party Capabilities to Microsoft 365 – Webinar
Review of Osterman’s latest research on the performance gaps in Microsoft 365 in the areas of security, archiving, eDiscovery and more. Sponsored by Cyren. Continue Reading
-
The Evolving Email Threat Landscape – Webinar
Exploring the evolving email threat landscape, with a focus on the threat of compromised email accounts. Sponsored by Agari. Continue Reading
-
Third-Party Code: The Hidden Risk in Your Website – White Paper
Learn how you can manage risk from third-party code and better protect your applications. Sponsored by PerimeterX. Continue Reading
-
Using Third-Party Solutions With Office 365 – White Paper
Exploring areas where focused third-party vendors with deep industry and solution experience are able to deliver deeper and better capabilities compared to Microsoft in Office 365. Sponsored by Censornet, Cyren, NetGovern, odix, Proofpoint, Quest Software and Symantec. Continue Reading
-
To Automate or Not to Automate Is Not the Question – Where and How Is – Webinar
Exploring the current state of automation in security, including artificial intelligence and machine learning. Where is the greatest business impact? Sponsored by Skybox Security. Continue Reading
-
New Methods for Solving Phishing, Business Email Compromise, Account Takeovers and Other Security Threats – White Paper
The network in most organizations has a dramatically expanded attack surface. There is no longer a defensible perimeter that can fully protect corporate data, and so new approaches, technologies and practices are needed to protect corporate data and finances. Sponsored by Agari, Carbon Black, GoSecure, KnowBe4, MDaemon, Proofpoint, SlashNext, Trend Micro, Trustwave and Zix Continue Reading
-
The ROI of Security Awareness Training – White Paper
Discusses the financial justification for deploying a robust security awareness training program and demonstrates the significant return-on-investment (ROI) that can result. Sponsored by CybeReady, Infosec, KnowBe4 and Mimecast. Continue Reading
-
Why Security Must Be Part of the Software Life Cycle – Webinar
Why current approaches to security management are no longer adequate, and why security should be part of the software development process. Sponsored by ZeroNorth. Continue Reading