Hacker Hour: Critical Components of Vendor Management
Explore the three critical components of vendor management, including monitoring, reviews, & risk assessments. Learn how to enhance your vendor strategies.
Hacker Hour: Internal Network Penetration Testing
Learn about internal network penetration testing and how it fortifies your cybersecurity defenses. Discover the methods and benefits on our webinar.
Are Password Managers Safe?
Are password managers actually safe? Explore the security of password managers in 2024 and weigh the risks and benefits
Hacker Hour: Strategies for Responding to Common Cybersecurity Incidents
Learn how to respond to common cyber incidents in our Hacker Hour webinar. Discover strategies & practical tips to enhance your cybersecurity response.
Assessing the Risk of the LastPass Breach
The theft of user password vaults is bad news for any password-manager solution. Learn more about the LastPass breach and recommended mitigations for users.
Threat Advisory: FIN7 Hacker Group Using Automation to Compromise Unpatched In-House Exchange Servers
Discover how the FIN7 group exploits vulnerable Exchange servers and infiltrates networks using Checkmarks, an automated system with CVEs and custom code.
Safeguards Rule Update
Discover the extensive criteria of the Safeguards Rule and its importance for information security programs. Ensure GLBA compliance with this valuable roadmap.
Log4j Status Update
Discover why the Log4j vulnerability from December 2021 is still a concern heading into late 2022. Learn more here.
FFIEC Update to Cybersecurity Resource Guide
Stay updated with the changing cybersecurity landscape as the FFIEC enhances its Cybersecurity Resource Guide with targeted resources on ransomware.
Threat Advisory: Two Microsoft Exchange Zero-days
Learn about the crucial mitigations for two newly discovered zero-day flaws in Microsoft Exchange Server, announced on September 29, 2022.

.png?width=400&name=SBSIWebinarsBundles_WebMenu%20(1).png)