Join us as we look at the key components to gaining full #cyber visibility: user activity, data activity, & analytics and how this insight can protect your business in our upcoming #InfosecWebinar - Dec 4 with @ObserveIT & @MichaelInfosec Register now!
Managing the Insider Threat: Why Visibility Is Critical
In this webinar, we will explore the key components to gaining full cyber visibility: user ac... more
In many areas of #cybersecurity, capture the flag competitions can act as accurate simulations of real-world scenarios. Our own @__winn takes us through the creation of a #threatintelligence CTF:
Creating a Threat Intelligence Capture the Flag Competition: An Overview
See inside our first threat intelligence capture the flag competition at RFUN 2018, complete ... more
CrowdStrike CEO and co-founder George Kurtz offers his views on nation-state threats, how companies can properly mitigate cyber risks, and other insights to The Parallax.
CrowdStrike CEO on political infosec lessons learned (Q&A) - The Parallax
CrowdStrike CEO George Kurtz shares his perspectives on political-hacking topics ranging from... more
Are you looking to configure permissions in Tanium Asset using role-based access controls? Follow the link where Scott Hinsley shares his best practice approach ow.ly/zyzx50jNSzC
No comments:
Post a Comment