V2-Courses/Webinars

The Changing Face of Endpoint Security in a 5G World

In today’s ever-changing cybersecurity landscape, firewall performance should be standardized in order to keep real-5G, the fifth generation of mobile networks, is more than just increased speed; it is a leap towards an always connected future, eliminating the need to rely on public or unsecured Wi-Fi networks, but also introducing new security and management challenges. In this on-demand webinar,

The Changing Face of Endpoint Security in a 5G World Read More »

Learnings from the Kaseya Supply Chain Attack and Mass Ransomware Incident

On Friday, July 2, at least eight MSPs were hit with ransomware that infected their infrastructure and many of their customers. The attack exploited some unpatched vulnerabilities in the on-premises Kaseya VSA product, and then leveraged the remote monitoring and management (RMM) solution to help spread the ransomware. The incident allegedly has affected up to 1,500 companies, and

Learnings from the Kaseya Supply Chain Attack and Mass Ransomware Incident Read More »

Building Smarter College Campuses with Multi-Factor Authentication

Student and faculty information can be accessed from anywhere at any time. With that comes the need to restrict unauthorized access to these applications and data. By adopting multi-factor authentication (MFA), higher education institutions know that their information is always safe and compliant. Join and learn about: Education and cybersecurity MFA in college campuses User

Building Smarter College Campuses with Multi-Factor Authentication Read More »

Top Reasons Why Manufacturing Needs Network Security

Manufacturing is one of the most hacked industries in the world, second only to healthcare. As manufacturers modernize their shop floors and set up sophisticated Operational Technology (OT) networks, they are increasingly falling in the crosshairs of determined cyber criminals. In this webinar, we will explore the unique security challenges of distributed manufacturers, including: IP

Top Reasons Why Manufacturing Needs Network Security Read More »

New Cyber Frontier

Welcome to the New Cyber Frontier, Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics. Hear about developments which impact and affect both the local Colorado efforts and the entire virtual world. You don’t have to be a computer or cyber security expert to

New Cyber Frontier Read More »

The Shared Security Show

Hosted by cybersecurity and privacy professionals Tom Eston and Scott Wright, Shared Security is a weekly show that explores the trust you put in people and technology. We bring you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in our connected world.

The Shared Security Show Read More »