Linux has become a staple for many organizational IT environments, due to its reliability and capacity to handle heavy duty tasks for enterprise servers. Unfortunately, attackers have also turned their gazes towards Linux servers, with the valuable data they store and networks they support. Many Linux environments continue to remain unprotected because they were thought to be immune to cyber threats for many years.
This course is designed to teach you Linux security basics that are easy to implement …
There comes a time when improving on an old method of solving a problem gets challenged by a completely new, radical approach. When it comes to cybersecurity, outdated, reactive, signature-based antivirus software dramatically increases the risk to your business while putting an undue burden on your IT staff.
Without artificial intelligence, cyber is a losing strategy. But not all AI is created equal. Come see why BlackBerry Cylance’s solutions that apply artificial intelligence, …
Join GRC expert Gerard Scheitlin for the first presentation in a series of sessions on risk management. This 10-minute session will discuss the structure of a risk, how it differs from an incident, and reviews a comprehensive approach to managing organizational risk.
By watching this session you will gain:
• An understanding of the difference between a Risk and an Incident
• The ability to build a risk structure and register for your …