Securing the Cloud Generation: Who’s Using My Cloud

Symantec

Organisations around the world are embracing cloud solutions like Office 365 at a breakneck pace, but online collaborative platforms can leave an unprepared organisation vulnerable to cyber-attacks. Who is accessing your cloud applications? Are they truly authorised users, and are they conducting illegitimate activities? Without sufficient visibility, detection and protection, it can be easy for a cyber-criminal, or rogue employee to slip through the cracks – and when they do, your sensitive data won’t be their only target.
Watch Now

Spotlight

Ransomware is no longer the new kid on the block. In fact, going back as far as 2005, ransomware has played a part in the world of cybercrime. As a relatively “easy” way for criminals to make money, it comes as no surprise that ransomware has gained many underground followers over the past 11 years. With new strains appearing online almost weekly, ransomware has become the number one concern of many IT security professionals and researchers. Whether it’s Archiveus, Reveton, CryptoLocker, Locky, or WannCry, one thing is certain: holding data for ransom is here to stay.


OTHER ON-DEMAND WEBINARS

5 Linux Security and Management Best Practices for Microsoft Cloud Implementations

5nine

While Linux’s lightweight operating system tremendously improves performance, its benefits often come at the expense of easier management and comprehensive security. Virtualization and cloud administrators – especially those with limited scripting know-how – are frequently challenged by Linux’s command-line-only interface. Microsoft Azure and Hyper-V fully support Linux instances, but don’t provide the tools, training or support required to manage and secure Linux VM lifecycles.

Decoupling Compute and Storage for Big Data

BlueData Software

In this webinar, we discussed how: - Changes introduced in Hadoop 3.0 demonstrate that the traditional Hadoop deployment model is changing. New projects by the open source community and Hadoop distribution vendors give further evidence to this trend. By separating analytical processing from data storage, you can eliminate the cost and risks of data duplication.

Working Remotely? Technology for Staying Productive

Mindshift Interactive

The “remote worker”…what does that term mean to you? Sitting on the couch in your pajamas? For some, it could. But whether they work from home or on the road, self-motivated employees who work remotely can deliver exceptional results with the right technology.

Document and enhance existing databases to reduce redundancy with ER/Studio

IDERA, Inc

In this session learn how to document existing databases to allow reuse of common data elements and structures, for better support of business objectives. Import and reverse-engineer content from multiple data sources and integrate the elements into reusable constructs with an enterprise data dictionary. Join this webcast to learn how IDERA's ER/Studio can help you build better databases. Scott Walz has more than 20 years of experience in the area of database development and currently serves as the Director of Software Consultants for Embarcadero Technologies. Prior to joining Embarcadero 14 years ago, Scott served as a development lead for Louisville Gas & Electric. He holds a bachelor's degree in computer information systems from Western Kentucky University.

Spotlight

Ransomware is no longer the new kid on the block. In fact, going back as far as 2005, ransomware has played a part in the world of cybercrime. As a relatively “easy” way for criminals to make money, it comes as no surprise that ransomware has gained many underground followers over the past 11 years. With new strains appearing online almost weekly, ransomware has become the number one concern of many IT security professionals and researchers. Whether it’s Archiveus, Reveton, CryptoLocker, Locky, or WannCry, one thing is certain: holding data for ransom is here to stay.

resources