Go Deeper

  • Organizations adopting cloud can use multi-cloud environments — multiple public cloud services, often along with on-premises physical, virtual, and private cloud infrastructure — in different ways. This adds elasticity and scalability to your infrastructure, but also makes it more difficult to gain a clear, holistic view across your IT ecosystem. This white paper explains how multi-cloud discovery addresses this challenge by providing insight into your assets and their relationships across every …

  • Breach and attack simulation (BAS) helps businesses automate and scale how they test their cybersecurity defenses. Unlike traditional penetration testing, which offers a point-in-time view of defenses, BAS can assess risk in real time, even as IT environments and networks change and increase in complexity.   Join technology journalist Sean Michael Kerner and Gus Evangelakos of XM Cyber, as they discuss how businesses can use breach and attack simulation to improve security, help meet compliance …

  • Linux has become a staple for many organizational IT environments, due to its reliability and capacity to handle heavy duty tasks for enterprise servers. Unfortunately, attackers have also turned their gazes towards Linux servers, with the valuable data they store and networks they support. Many Linux environments continue to remain unprotected because they were thought to be immune to cyber threats for many years.   This course is designed to teach you Linux security basics that are easy to implement …