On Demand
Critical infrastructure organizations that manage operational technology (OT) systems or Internet of Things (IoT) devices face increasing cyber threats. Learn why Active Directory security is key to operational resilience in OT/IoT environments and how to prepare for a worst-case scenario.
Join us for this webinar where James McQuiggan, Security Awareness Advocate at KnowBe4, delves into the complexities of deepfakes, offering insights into their creation and detection.
Your IT team needs to keep up with these evolving attack strategies. Sign up for this free three-hour virtual summit and get an in-depth, expert-led guide to protecting Entra ID in today's evolving security landscape. Learn how to modernize your security strategy, plus the newest tools to help you fortify your Entra ID environment before the worst happens. Don't wait -- register today!
Join us for this webinar where Erich Kron, Security Awareness Advocate at KnowBe4, walks you through our comprehensive how-to guide to build a step-by-step security culture action plan.
In this live Tech Talk, veteran technology journalist John K. Waters talks with Mike Jones, VP of Product Development at US Cloud about the key differences between MCA, EA, and other options. As well as how each agreement can affect your organization’s support costs.
Our panel of experts will show you how in this free, three-hour summit, where they'll walk you through implementing and managing anti-ransomware analytics. Don't miss it -- register today!
Modern IT environments are complex and ever-changing. Join our live Tech Talk to discover how Kaseya 365 bundles essential tools into a single subscription, streamlining IT management for MSPs. Don't miss this chance to learn how Kaseya 365 can enhance security, automation, and efficiency in your IT operations.
It’s time to stop being jerked around by fads and commit to doubling down on the real work. Join Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer, as he sheds light on the top security issues and practices security leaders should be aware of. This is about concentrating your time, budget, and efforts where they’ll have the most benefit for your organization.
With 86% of organizations stating they had cloud-hosted data affected by ransomware in 2022, IT teams are left with concerns around who will manage all their clouds, all while ensuring cyber security prevention, data protection, and other critical IT controls. series. Veeam® cloud experts, Leah Troscianecki and Karinne Bessette, will take you through an important cloud cybersecurity basics masterclass in 3-2-1.
Join us for an informative session on Veeam Data Cloud for Microsoft 365, our new as-a-service solution, and discover how it can revolutionize your data backup and recovery strategy. In this webinar, we will explore robust features and capabilities, designed specifically to fit the needs of small businesses. Learn how this feature rich solution helps save time on managing your backup infrastructure and keeps things simple with a modern, secure, and intuitive UI. Don't miss this opportunity to unlock the power of cloud backup and safeguard the future of your business.
Join us for this free, expert-led summit where you'll learn the best ways to automate your cloud's security so you stay one step ahead of the attackers.
Join our webcast to discover how to harness the power of AI for your data management strategy. Learn to prepare for the challenges of AI integration, from data security and reliability to ethical considerations and automation. Don't miss our expert tips for modernizing your data management in the AI era!
Don’t miss out on this opportunity to enhance your data analysis and security monitoring capabilities with Microsoft Sentinel. Dive into the realm of third-party cloud applications and their built-in connectors, simplifying event logging data integration into Sentinel.
Join the editors of Redmondmag.com as well as leading IT security veterans as we look at Entra ID's role as a security risk and the top industry best practices for mitigating that risk.
Join us to discover why Business Email Compromise (BEC) attacks soared to $2.9 billion in losses in 2023, ranking as the second-costliest cyber-crime category of the year. Dive into our webinar as we delve into why BEC attacks blend employee awareness with technical security controls, and explore if they constitute the ultimate supply chain threat. Don't miss out on practical insights to safeguard your organization