Recent announcements from industry giants have triggered a paradigm shift in how emails are validated and accepted. Watch now to delve into the intricacies of these changes, the dangers email authentication aims to thwart, and practical insights and strategies to ensure your emails pass the checks.
All our webinars, all in one place
Watch now to explore a SIEMphony of love that will guide you through evolving challenges and transform the very essence of SIEM. Discover insights from proven strategies that ensure your security teams are equipped to navigate the future with skill and confidence, so you can build loving, long-term relationships.
Bringing in external managed detection and response (MDR) or creating an internal team needs a lot of thought. For some, a 24/7/365 service may seem out of reach. Watch now as we outlined what detection and response really is and some of the fundamentals that will help you find what works for your organisation.
Insider threats have risen by 44% over the past two years, with each incident costing an average of £381k. Whether caused by employee negligence or malicious intent, insider-related incidents pose a serious risk. Watch the recording to learn why AD security is key, how to spot AD weaknesses, and how to close backdoors.
Learn about the advancing digitalisation in the UK energy industry and explore the interactions between legacy and innovative technologies. How can experts introduce new technologies and practices while avoiding ‘legacy problems’ of accidental errors, security incidents, and safety failures?
Discover trends in the threat landscape and analyse incidents from 2023, including developments in ransomware and supply chain attacks, and advice from the front line to help you mitigate cyber risk in your business. You’ll also hear from front-line IR experts about how to avoid incident response pitfalls.
Watch now to discover insights from a year’s worth of incident responses, including motivations behind attacks, the staggering percentage of ransomware attacks wielding dual threats of both exfiltration and encryption, and why smaller organisations are often notified of incidents by their larger customers.
We shed light on the application, possibilities and unique dynamics of the drone industry, and dissect some of the inherent risks. Drawing parallels with other sectors, we discuss relevant historical perspectives to contextualise security considerations and further understand this evolving industry.