Skip to main content

Cybersecurity Resources

Latest thinking and useful insights on the changing landscape of cybersecurity.

Webinars

Why asset discovery is the missing link to your enterprise vulnerability management

Learn how an asynchronous approach can help build an enterprise CMDB and automate continuous detection for any new and critical vulnerabilities in your asset repository so you’ll never miss a critical risk again

Webinars

Understanding the 7 deadly web application attack vectors

We explain how to accurately identify the risk levels of your web application

Webinars

Protecting Cezanne HR’s cloud web application with continuous assessment

We discuss the importance of data protection in HR, and how a hybrid continuous assessment approach has helped secure their business critical apps and maintain ISO certification standards at scale

Webinars

Mastering container security in modern day DevOps

We examine the security challenges that come with container adoption and unpack the key steps required to integrate and automate container assessment into the DevOps cycle

Webinars

DevOps to DevSecOps Webinar: Delivering quality and secure development from the start

Learn how to engage with developers through gamified learning and embed security testing without any downtime and costing the earth

Webinars

To agent, or not to agent and how to get it right

We will highlight the benefits and drawbacks of each approach when determining the risk of different assets and analysing vulnerabilities on your network

Webinars

Vulnerability Management – Opportunities and Challenges!

Learn what the benefits but also challenges are with working actively with Vulnerability Management as a tool in your IT Security portfolio.

Webinars

Why security perfection is the enemy of DevSecOps

Learn how to implement an agile DevSecOps to carry out the necessary security checks without compromising on time-to-market

Webinars

Towards Full Stack Security and Prevent Hacker Pivot

Learn how to move beyond component assessment of devices, networks, applications, data, and users into full-stack cybersecurity assessment

Looking for anything in particular?

Type your search word here