How to Manage Insider Risks in the Work-from-Anywhere World
In 2020, it cost an average of $11.45 million annually to handle incidents caused by insider threats. That’s a big reason to make a functional insider threat program a core part of your cybersecurity strategy. Protecting your organization’s sensitive data in this work-from-anywhere world is a huge challenge. You need controls in place to deter, detect, and disrupt insider attacks. Purpose-built controls are also necessary to prevent inadvertent data leaks and meet compliance requirements. In this technical training, we’ll examine popular insider attack patterns. Learn how you can use Ekran to implement insider risk mitigation. Register and Watch Now!
Preparing Linux Hosts for Unexpected Threats
Linux has been hugely successful in the enterprise over the past few decades, partially due to the flexibility and extensibility of the operating system. This has lead to upsides and downsides. One upside: powerful instrumentation that can be leveraged for system control and visibility. A downside: the increasing need to trust more and more sources of third-party code – OS updates and a multiplying list of package repositories: container repos, PyPI, CPAN, NPM, RubyGems and many more. Systems administrators and security practitioners will learn about threats unique to Linux systems and how to leverage the…
This Webcast is available on-demand
Listen Now!