On Demand
Take control of your unstructured data! Join our free, expert-led virtual summit to learn actionable strategies for securely storing, managing, and disaster-proofing your data. Don’t miss out—register today!
In this on-demand webinar, Matt Spero, Partner Business Development Manager at Insight, will delve into changes coming to Windows along with the AI-enabled and Windows 11 Pro device roadmap. Join in to learn more!
Join us and zero trust expert, Jason Garbis, for a practical review of how you can implement ZTDR today.
Learn how to harden your security posture in this free summit, where our panel of top experts will share their most useful best practices for securing all of your endpoints.
Join us to learn how to keep your SaaS data secure, compliant, and resilient. This expert-led, three-hour summit will guide you through essential defense-in-depth strategies, from the core principles to top solutions for sustainable protection. Don't miss out—register now to safeguard your organization's SaaS data.
Join us for this insightful Tech Talk to learn how to safeguard your organization against growing cyber threats targeting machine identities. Discover practical strategies and automated solutions that enhance security, reduce risks, and streamline the management of service accounts, bots, and RPAs. Don't miss this opportunity to hear from industry experts and stay ahead of emerging trends!
Discover the keys to a stronger cybersecurity strategy at the Defense-in-Depth 101 Summit. Learn how to adopt a sustainable, multi-layered defense that keeps attackers out and your organization secure. Don’t miss expert insights, practical tips, and best practices—register now!
To harness AI’s full potential, enterprises require a robust and secure infrastructure. Microsoft Azure provides a dedicated cloud AI platform equipped with pre-trained models, scalable compute capabilities, and comprehensive data management services. Join in to learn more.
Cybercriminals are constantly finding new ways to hack into Microsoft 365 accounts. In 2023, valid credential abuse was the top method used for initial access, accounting for 30% of incidents. Session hijacking vulnerabilities were identified in 15% of all security misconfigurations. Huntress is dedicated to providing you with the tools you need to combat today’s adversaries.
This webinar is designed for IT professionals, cybersecurity teams, and organizational leaders who are looking to enhance their endpoint security posture. Whether you are new to EDR or seeking to optimize your current strategy, this session will provide valuable insights into how Huntress Managed EDR can safeguard your environment.
Your business’ security is only as strong as its weakest link, and more often than not, that weakest link is actually your people. According to Verizon's 2023 Data Breach Investigations Report, 74% of all data breaches involved people - well-meaning users, who accidentally clicked on a malicious link, inadvertently shared a password, or fell victim to social engineering.
Every day, we’re bombarded by massive amounts of information. From daily news and stocks, to the latest box scores, keeping up with it all is a full-time job. Your IT infrastructure is no different. Millions of logs circulate through your IT systems, including firewall data, system logs, and endpoint events to name a few.
Check out this Huntress webinar for a live demonstration and behind-the-scenes look at Huntress Managed Detection and Response (MDR) for Microsoft 365.
Are you in the market for an EDR solution? Have you thought about having it managed by an MDR provider? Are all of these abbreviations very confusing? We don’t blame you—in the world of cybersecurity, there are way too many terms you’re expected to know without much explanation. In this session, learn about the pros and cons of different EDR and MDR solutions for those without a ton of technical experience. This advice is for anyone looking for a new EDR or MDR, but is made specifically for non-experts, so you can make the best choice for your organization whether you’re a seasoned pro or not.
In today’s technological landscape, Active Directory (AD) is a constant attack point for attackers. A common vector of attack against Active Directory is via group policy. Group policy can be used as a very effective direct or indirect method of executing remote code, modifying security settings, changing user permissions, and much more.