Skip to main content

Cybersecurity Resources

Latest thinking and useful insights on the changing landscape of cybersecurity.

Webinars

Risk based vulnerability management: What's in a risk score?

We identify the benefits of a risk-based approach, highlighting how this can make vulnerabilities more manageable and streamlining remediation through automation and orchestration

Webinars

Cloud security controls best practice

How best to manage between them with Gartner’s CWPP and CSPM models, combined with practical advice on how security professionals can utilize CIS benchmarking to analyze gaps in AWS, Azure and GCP more effectively. 

Webinars

Mastering the art of multicloud security

We discuss the challenges and pitfalls you might face throughout the cloud migration journey, and show you how our cloud security tools help to mitigate the risk of data leak from ‘shift and lift’ to ‘cloud native’ from top to bottom.

Webinars

Why asset discovery is the missing link to your enterprise vulnerability management

Learn how an asynchronous approach can help build an enterprise CMDB and automate continuous detection for any new and critical vulnerabilities in your asset repository so you’ll never miss a critical risk again

Webinars

Understanding the 7 deadly web application attack vectors

We explain how to accurately identify the risk levels of your web application

Webinars

Protecting Cezanne HR’s cloud web application with continuous assessment

We discuss the importance of data protection in HR, and how a hybrid continuous assessment approach has helped secure their business critical apps and maintain ISO certification standards at scale

Webinars

Mastering container security in modern day DevOps

We examine the security challenges that come with container adoption and unpack the key steps required to integrate and automate container assessment into the DevOps cycle

Webinars

DevOps to DevSecOps Webinar: Delivering quality and secure development from the start

Learn how to engage with developers through gamified learning and embed security testing without any downtime and costing the earth

Webinars

To agent, or not to agent and how to get it right

We will highlight the benefits and drawbacks of each approach when determining the risk of different assets and analysing vulnerabilities on your network

Looking for anything in particular?

Type your search word here