| May 24, 2023 The Impact of AI on the Cybersecurity Landscape Join Avertium and Microsoft Security for a discussion on what AI means for the future of cybersecurity and how AI in cyber can impact different industries.
| Oct 19, 2022 Breaking Down Barriers with Detection-as-Code Join us as we discuss Avertium powered by SnapAttack, our process & methodology behind detection-as-code, and what integrated partnerships like this have to offer you and your business.
| Aug 5, 2022 The Art + Science of Pre-Crime Threat Hunting Threat hunting is an essential strategy. Learn about threat hunting vs. threat detection, emerging threat hunting methodologies, and much more.
| May 18, 2022 How Your Third Parties are Making You Uninsurable Learn how threat actors are exploiting third-party risks and how insurance carriers can quantify those risks to write more comprehensive cyber policies.
| May 18, 2022 How Did We Get Here? The Past, Present, and Future of Supply Chain Risk Learn about the impact of historical supply chain attacks, what the future of supply chain risk looks like, and what you can be doing to prevent a breach.
| Sep 15, 2021 Appgate: Practical Steps to Deploying Zero Trust Network Access Learn about Zero Trust Network access fundamentals, the benefits of ZTNA, and the challenges you might encounter as you make the shift to a ZTN model. Part 2 of a 3-part series.
| Sep 15, 2021 Scaling Remediation in the Face of Competing Priorities Learn how you can leverage NIST CSF to scale a vulnerability management program and accelerate your remediation efforts.
| Sep 15, 2021 Remote Workforce + Data Breach: A Perfect Storm With companies having to quickly pivot to a remote workforce, it's important to adapt your incident response (IR) plan, data privacy procedures, and more.
| Sep 15, 2021 Appgate: When “Trust but Verify” isn’t enough. Learn about Zero Trust Network access fundamentals, the benefits of ZTNA, and the challenges you might encounter as you make the shift to a ZTN model.
| Sep 15, 2021 New Techniques to Strengthening Threat Detection and Response Learn about the role of a SIEM in a ZTNA approach to cybersecurity.