Scheduled Live Events
SSD-Enabled Devices Security Risks
|
2017-11-16 (Webinar @ 1:00pm ET) |
Recently Discovered SSD Vulnerabilities Could Cripple Global Markets with Data Corruption if exploited by attackers. Recently discovered multi-level cell (MLC) solid-state drive (SSD) vulnerabilities by researchers from Carnegie Mellon University, Seagate, and the Swiss Federal Institute of Technology in Zurich, reveal the first-ever security weakness of its kind against MLC SSDs that store much of the world’s data.
Two different types of malicious attacks are reported to corrupt data, leaving much of the world’s data currently exposed while organizations search for answers. Who should attend? Anyone that is:
Register today to see if you qualify for this limited access event. Get your registration link to this FREE live webinar. |
Misconfigurations Are the Cause. More than 8 out of 10 incidents are caused by hard-to-spot misconfigurations. Over time, IT systems and their configuration items (CIs) invariably move towards a state of disorder.
Left unchecked, these continuous changes to the environment’s software and hardware result in
Learn from experts have seen it all—from compliance automation across three continents to configuration drift across 20,000 nodes. Register today to see if you qualify for this limited access event. |
Recorded Events
|
Cyber security awareness training has measurable ROI. Considering the financial impact of loss in productivity or long-term consequences from reputational damage; cyber security awareness training is worth its weight in gold. And what you can do about it.
If you are in a leadership role for your team, company, or organization, this non-technical information dissemination we believe should prove timely and useful. Relax and click on the video, and in less than 35 minutes, you will get what you need to know. If you have time, stay for the Q&A. |
|
Whether it is for making sure your business doesn't get damaged, or the race for the highest office in the US, hackers are finding new ways to exploit the massive use of the Cloud. This webinar will call on industry experts who will detail where and how hackers are gaining access.
And what you can do about it. If you are in a leadership role for your team, company, or organization, this non-technical information dissemination you will most likely find profoundly useful. Kick-back and click on the video, and in 40 minutes, you'll be better prepared and have a deeper understanding. |