Security
Security Insights
Filter by Content Types
- No options
989 results found
Hands-On Lab Workshop: Cyera Foundations
Join us for the Virtual Lab Workshop! During this exclusive session, the hostwill introduce the Cyera Foundations Lab and Cyera Data Security Platform learning path. This workshop is designed to provide an environment to gain hands-on experience with the fundamental features of Cyera. This one-hour event is limited to a small group of participants who will have the opportunity to engage in Q&A during the session. Attendees are encouraged to actively participate by launching the lab themselves alongside the presenter for a hands-on experience.
Webinar
•Jul 10, 2025 • 11am
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Jun 12, 2025 • 10am
Hands-On Lab Workshop: Red Team Tools with Bloodhound
Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce Red Team Tools Bloodhound and Impacket that are within the Security Testing Suite learning path. These mini-labs walk users through post-exploitation security tools that they may use during a Cyber Range red team event. This learning path will teach you the fundamentals of comprehensive penetration testing tools such as Bloodhound, Impacket and other tools like Mimikatz and BurpSuite.
Webinar
•May 22, 2025 • 11am
Cyber Insights Report - May 19, 2025
The M&S cyber attack reveals a shift from data theft to operational disruption, highlighting vulnerabilities in legacy systems. This breach underscores the need for cyber resiliencee over mere defense, challenging businesses to rethink continuity strategies amid rising AI threats and regulatory pressures. Resilience, not just protection, is the new imperative.
Blog
•May 19, 2025
Hacking the Future: Tom Leighton on Akamai's AI Cybersecurity Revolution
How is AI reshaping the future of cybersecurity — and what can we learn from one of the pioneers leading the charge? Join Akamai CEO and co-founder Tom Leighton in a candid conversation with WWT's Traci Byrne as they explore how Akamai has evolved from content delivery trailblazer to a key player in global cybersecurity. This discussion will unpack the growing importance of API security, the role of AI in strengthening digital defenses and what it takes to stay resilient amid increasingly complex threats and geopolitical pressures. Whether you're navigating enterprise security challenges or simply curious about where the industry is headed, this session offers thoughtful perspectives and timely insights you can apply in your own work.
Video
•1:53
•May 19, 2025
Partner POV | Next-generation Network Access Control: Zero Trust Security Without the Complexity
In the last 12 months, most organizations have experienced 7 or 8 security breaches that resulted in data loss or downtime.
This sobering statistic, recently published by Ponemon Institute in the report, The 2025 Global Study on Closing the IT Security Gap, sponsored by HPE, highlights how important it is for organizations to close cybersecurity gaps that can expose them to risk and leave them vulnerable to threats.
Partner Contribution
•May 14, 2025
Entitled to Nothing: How to Evaluate an IGA Solution Before it Evaluates You!
This post provides key considerations, traps to avoid and an IGA evaluation checklist that will make your compliance officer smile.
Blog
•May 14, 2025
Identity & Access Management with CyberArk
The CyberArk learning path provides a high-level overview of Identity & Access Management (IAM) and some of its features and capabilities. In addition, this learning path introduces CyberArk's Privileged Access Security (PAS) solution and provides a lab environment to gain hands-on experience with the solution.
Learning Path
Unlocking the Right Fit: A Practical Guide to Evaluating a Workforce Access Management Solution
In this short and strategic guide, we'll help you cut through the jargon, and get clear on what actually matters when it comes to choosing the perfect Workforce Access Management solution.
Blog
•May 12, 2025
Cyber Insights Report - May 12, 2025
A massive Oracle Cloud breach exposed 6 million records, highlighting vulnerabilities in SaaS supply chains and the urgent need for modernized SOCs. This incident challenges enterprises to rethink security strategies, emphasizing visibility, response and accountability in multi-cloud environments. How prepared is your organization for such a cyber threat?
Blog
•May 12, 2025
BeyondTrust Privileged Access Management
This learning path provides an exploration of privileged access management with real-world use cases and guidance on how to protect your organization from threats targeting privileged accounts. This learning path covers foundational topics to gain an understanding of how BeyondTrust can benefit your organization.
Learning Path
Partner POV | The Importance of How Data is Scanned
Data discovery and classification are the foundations for DSPM and data security, but how your data is scanned is more important than you may think.
Partner Contribution
•May 10, 2025