Back to Search Begin New Search Save Search Auto-Notify
Securing Mobile Endpoints: App Vetting...
Securing the mobile ecosystem requires more than MDM and MTD. Even with Microsoft Intune (MDM) and Defender (MTD), organizations still face risks from mobile apps, especially in today’s world of viral apps. Unvetted apps can introduce malware, access to data through excessive permissions, collude with other apps, and more. While MDM and MTD help close security gaps, ignoring app risks still leaves organizations exposed to attacks. For or...
March 19, 2025
Organizer: Quokka
Location: Webcast
Add Favorite
Top Mobile Security Stories & Trends of...
2024 has been a whirlwind year for mobile security. From new emerging threats to AI advancements, the landscape has evolved rapidly and 2025 is sure to bring new challenges. Join us for a webinar where we’ll dive into the most significant mobile security stories and trends that shaped this year and discuss cybersecurity challenges we can expect in 2025. In this webinar, our cybersecurity experts will:Recap the Top Threats: Explore the ne...
December 11, 2024
Organizer: Quokka
Location: Webcast
Add Favorite
Mobile Apps are the New Endpoint
Apps have become the new endpoint for the modern enterprise, driving productivity, revenue, and customer engagement. Globally, approximately 4 billion iOS and Android mobile devices are in use, with an average of 80 apps on each device, and each app is updated an average of 12 times a year. That means there are nearly trillions of app endpoints on devices that handle and transmit sensitive data, connect to cloud services, and access critical e...
November 6, 2024
Organizer: Quokka.io
Location: Webcast
Add Favorite
Ransomware Defense: Protecting Critical...
The sharp rise in ransomware attacks on the critical infrastructure sector has cost millions of dollars in terms of payment and recovery in the past year. Ransomware attacks grew an astounding 485% in 2020 compared to 2019. As these attacks increase in persistence and scale, the federal government and NIST guidelines to improve cybersecurity and curb ransomware provide the required security measures to protect against such disruptive attacks....
October 13, 2021
Organizer: Centrify
Location: Webcast
Add Favorite
Leadership Lessons for Elite Teams
ThycoticCentrify invites you to our upcoming webinar featuring Brent Gleeson, a Navy SEAL combat veteran and leadership coach, as he presents, “Leadership Lessons for Elite Teams.” Brent will share stories and lessons learned from the battlefield, and how those best practices apply to leadership at any level, across any type of organization or team. Brent will leave attendees with at least three key takeaways that they can start ap...
April 28, 2021
Organizer: Centrify
Location: Webcast
Add Favorite
PAM-demic Cybersecurity a Year after th...
Cloud transformation and granting secure remote access were two initiatives accelerated by cybersecurity professionals in 2020. Faced with a pandemic, virtual and remote became the new normal. While 48% of organizations accelerated their cloud migrations due to the pandemic, the urgency of businesses to adapt to the new normal often meant security was left behind. In this Centrify CyberCast, Dr. Chase Cunningham will share his insights on how...
March 18, 2021
Organizer: Centrify
Location: Webcast
Add Favorite
Valentine's Day Virtual Mixology ...
Elevate your at-home cocktail-making and cooking skills just in time to impress your Valentine at this fun and interactive class designed for information security professionals. Learn about the tools, techniques, and recipes mixologists and chefs use from your very own kitchen.We will provide a list of a few simple ingredients and tools in advance so we can whip up some delicious cocktails and a special entrée together! Don't drink alco...
February 10, 2021
Organizer: Centrify
Location: Webcast
Add Favorite
Navigating Through the Mind of a 2021 Hacker
The number of data breaches has skyrocketed in recent years, with global cybercrime-related damages expected to exceed $6 trillion annually by 2021. Just this past month, we faced a major supply chain attack, leveraging SolarWinds Orion software to deliver malware and compromise hundreds of organizations worldwide. While this campaign was allegedly carried out by a nation-state, it followed a common anatomy of a hack that consists of key basic...
February 3, 2021
Organizer: Centrify
Location: Webcast
Add Favorite
Cloud PAM Confidence
GOING TO THE CLOUD? There are so many complex decisions companies, IT staff and Security professionals must make; your PAM solution does not have to be one of them. WHAT DOES A BEST-IN-CLASS PAM SOLUTION LOOK LIKE? Works across multiple Cloud Service Providers while providing the same level of protection in your existing datacenters Simple implementation that does not require large amounts of Infrastructure Can integrate with your existing wor...
September 15, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
Back to Search Begin New Search