Webcast Slide Deck | Ransomware has gone nuclear
A new generation of attackers are crafting plans to cause the most panic, pain, and operational disruption. They will take the time to maximize your organization’s potential damage and also their payoff -- not just encrypting your data, but stealing it and posting it publicly if you don’t play ball. Join Roger Grimes from KnowBe4 and Tim Phillips from The Reg for a RegCast in which they will be sounding the ransomware emergency klaxon.
A Definitive Guide to Understanding and Meeting the CIS Critical Security Controls
The CIS Critical Security Controls are the industry standard for good security. Are you up to par?
Busting the myths around cloud data protection
How flexible and resilient is your data center backup and disaster recovery solution? Can you protect and manage your workloads, while ensuring security and compliance? SaaS data protection, done right, can offer reliability, flexibility, and cost savings. Join our Regcast to bust outdated myths about how to protect your data in the cloud.
Top Threats to Cloud Computing: The Egregious 11
This CSA’s 43-page report shines a light on the challenges security teams face, offers key takeaways from experts in the field, shares security guidance, and shows where CSA’s cloud control matrix, or CCM, provides coverage.