I did not know you could do X, Y, Z with VirusTotal

TL;DR: VirusTotal is hosting an EMEA webinar on June 4th showcasing our advanced threat enrichment and threat hunting capabilities, register for the webinar, it is free.“I did not know you could do X, Y, Z with VirusTotal”, this is the most common feed… Continue reading I did not know you could do X, Y, Z with VirusTotal

Upcoming Webinar: Why Taking a Risk-Based Approach to your Cybersecurity is Required in Today’s Changing Landscape May 13, 2020

May 13th, 2020 2:00 PM EST COVID-19 is exponentially changing and propelling organizations into new business models – where digital transformation of further business processes, employees increasingly working remotely and increased cyber threats … Continue reading Upcoming Webinar: Why Taking a Risk-Based Approach to your Cybersecurity is Required in Today’s Changing Landscape May 13, 2020

Managing and Responding to Advanced Cyber Risks in the Oil and Gas Industry

To protect the integrity and safety of their business-critical assets, cybersecurity must be a top priority for the oil and gas industry. Although they operate some of the nation’s most critical systems, securing these complex infrastructures can… Continue reading Managing and Responding to Advanced Cyber Risks in the Oil and Gas Industry

Join me for a webinar about making cybersecurity relevant in modern day culture

Next week, on Thursday 12th September 2019 at 3pm UK (that’s 10am EST), I’ll be participating in a webinar hosted by The Register alongside MetaCompliance’s Robert O’Brien – and I’d love it if you joined in!
Continue reading Join me for a webinar about making cybersecurity relevant in modern day culture

Gain the Trust of Your Business Customers With SOC 2 Compliance

In today’s business environment, data is what matters most. It matters to organizations that monetize it into operational insights and optimisations, and it matters the threat actors that relentlessly seek to achieve similar monetisation by compromisin… Continue reading Gain the Trust of Your Business Customers With SOC 2 Compliance

Petri Webinar: Tips, Tricks and Best Practices for Physical Server and Endpoint Backup

Organizations have data in many different places that needs to be made available and in an upcoming webinar, you can learn the tips and tricks to making this a reality.
The post Petri Webinar: Tips, Tricks and Best Practices for Physical Server and En… Continue reading Petri Webinar: Tips, Tricks and Best Practices for Physical Server and Endpoint Backup

Tips, Tricks and Best Practices for Physical Server and Endpoint Backup


Organizations have data in many different places that needs to be made available. Whether it is a physical server or a desktop, roaming laptop or a few other configurations – that data needs to be protected against everyday occurrences such as lapses in connectivity, hardware failures, file corruption — or even ransomware or theft.

The post Tips, Tricks and Best Practices for Physical Server and Endpoint Backup appeared first on Petri.

Continue reading Tips, Tricks and Best Practices for Physical Server and Endpoint Backup

Ask an expert: How to start and advance your cybersecurity career

The post Ask an expert: How to start and advance your cybersecurity career appeared first on Infosec Resources.
Ask an expert: How to start and advance your cybersecurity career was first posted on…
Go on to the site to read the full article
The post… Continue reading Ask an expert: How to start and advance your cybersecurity career

Answering Your Emotet Questions from the Webinar, Emotet: Taming a Wild Trojan

On June 12, we hosted a deep-dive technical webinar on Emotet, featuring Robert Bigman, former CISO at the CIA, and James Wright, VP Engineering and Threat Research at Bromium In this blog, we answer your Emotet questions submitted during the webi… Continue reading Answering Your Emotet Questions from the Webinar, Emotet: Taming a Wild Trojan