What's New in Group Policy Administrator 5.0
By: SUSE View more from SUSE >>
Download this next:
Netwrix PolicyPak Demo: Master GPO Optimization for Enhanced Security
By:
Type: Replay
Reducing the number of GPOs enhances system performance, resulting in quicker user login times. It also simplifies the administrative process, making managing user settings and system configurations more straightforward. Additionally, a streamlined set of GPOs facilitates a more efficient and less complex auditing process, which aids in maintaining security and compliance standards. With the Netwrix PolicyPak GPO Reduction and Consolidation Pak, you can consolidate multiple policies into a single Group Policy Object, enabling you to streamline your security, compliance, and management practices. You can also leverage Item-level targeting and Group Policy Preferences to simplify GPO deployment across domain-joined and non-domain-joined environments. Join this webinar and learn how to: - Consolidate and simplify legacy GPOs for easier management. - Export and migrate GPOs to your MDM and UEM platform to ensure parity across managed workstations. - Leverage Group Policy Preferences and Item-level targeting for granular policy deployment - Achieve Group Policy parity across domain-joined and non-domain-joined workstations
These are also closely related to: "What's New in Group Policy Administrator 5.0"
-
Fully Utilizing Closed Systems in Modern BioPharma Facilities
By:
Type: Talk
Presented by Lars Hovmand-Lyster, Senior Engineering Specialist in Novo Nordisk Global Project Office (GPO) Engineering Management Department • Build the roadmap to biopharmaceutical manufacturing and their partners in developing, assessing and verifying unit operations leading to an appropriate facility design that is “right classified” • Hear first-hand about this industry-developed document to understand the tools, steps and documents required to adequately risk assess and qualify modern facilities that make use of modular, closed technology • Learn how following a methodology results in significant gains in reducing the time to deliver the facilities and CAPEX and OPEX costs
-
Group Policy Gotchas: GPO Settings That Expose Your Environment
By:
Type: Replay
Group Policy can provide massive security value if used correctly — and if used incorrectly, it can expose your Windows environment to cyberattacks. To tap into this built-in tool’s security potential, IT pros of all experience levels must learn to tame the Group Policy beast. Know which GPO settings can put your organization at risk, and how to tune your environment to maximize your visibility. Join Brien Posey, a 20-time Microsoft MVP and IT expert, and Blumira’s Erica Mixon, Content Manager, for tips and tricks to harden your environment with Group Policy. They’ll discuss: Tangible takeaways and things you’ll be able to do right away in Group Policy to make a difference Why improperly configured event log sizes can lead to aggregation issues How to enable SMB signing to reduce your attack surface Free tools like Logmira to eliminate the manual work of Group Policy This interactive, conversational-style session encourages questions and engagement with viewers – so sign up today for access to our security experts.
Find more content like what you just read:
-
Active Directory integration features in Ubuntu 22.04
By:
Type: Talk
Active Directory (AD) is the most popular user and endpoint identity management system in medium and large enterprises. Ubuntu supported AD integration for a very long time, however this was limited to user authentication and did not allow to take advantage of the more advanced features like Groups Policy Objects and scripts. With Ubuntu Desktop 22.04 we have listened to the sysadmin feedback and introduced ADsys, a new, groundbreaking client which enables the following functionalities: Full Group Policy Object (GPO) support, natively baked into the OS Privilege management, giving you the possibility to execute tasks as a privileged account Custom shell scripts execution for logon, logoff, startup and shutdown. Join us for a demo and live Q&A to learn more about the new AD integration features and discuss how we can help you manage your Ubuntu estate with the same tools you currently use to manage your Windows clients. If you want to learn more about Ubuntu Desktop, Ubuntu Advantage or our advanced Active Directory integration features please do not hesitate to contact us to discuss your needs with one of our advisors.
-
New Active Directory integration features in Ubuntu 22.04
By:
Type: Talk
Active Directory (AD) is the most popular user and endpoint identity management system in medium and large enterprises. Ubuntu supported AD integration for a very long time, however this was limited to user authentication and did not allow to take advantage of the more advanced features like Groups Policy Objects and scripts. With Ubuntu Desktop 22.04 we have listened to the sysadmin feedback and introduced ADsys, a new, groundbreaking client which enables the following functionalities: Full Group Policy Object (GPO) support, natively baked into the OS Privilege management, giving you the possibility to execute tasks as a privileged account Custom shell scripts execution for logon, logoff, startup and shutdown. Join us on this webinar to learn more about the new AD integration features and discuss how we can help you manage your Ubuntu estate with the same tools you currently use to manage your Windows clients. If you want to learn more about Ubuntu Desktop, Ubuntu Advantage or our advanced Active Directory integration features please do not hesitate to contact us to discuss your needs with one of our advisors.
-
A Timeless Problem: Preventing USB Data Loss at Your Organization
By:
Type: Talk
In the late ‘90s and early ‘00s, USB flash drives were a hot commodity. Back then, they were not very common, had 8MB of storage and the concept of data leaks or picking up malware from one was not considered a major threat. Fast forward over two decades later and not only are they faster but much, much larger often with capacities of up to 1 terabyte. What could sit on a stick of that size? Your whole 'My Documents' folder! Despite this, many companies continue to have relaxed policies around USB sticks, along with little to no technical controls in place around them. The dangers of uncontrolled USBs include data ingress (think intellectual property and designs from rivals along with stolen music and films), data loss by egress, the spread of malware, and more. When it comes to blocking these threats, deploying a Data Loss Prevention solution can go well beyond the capabilities of GPO (Group Policy Objects) settings or antivirus; it can also offer many ways of controlling USBs with fine granularity. In this webinar, Graeme Batsman, Fortra’s Sr. Professional Services Consultant will share his expertise on: - Dangers of uncontrolled USBs - Past leak stories from the press - Options to control USBs - Options to encrypt data moving to USBs” And live demos of course!
-
3 trends in strategic health care supply chain management
By: Advantus
Type: White Paper
If you haven’t refreshed your plan for the post-COVID-19 environment, you’re not alone. 1 in 4 health care supply chain leaders still don’t have a strategic plan. Learn how the top organizations are reinventing the traditional health care supply chain to succeed under today’s financial pressures in this white paper.
-
The healthcare supply chain: Trends & how to achieve long-term value
By: Advantus
Type: White Paper
Read this paper to garner the value of a transformational—not transactional—healthcare supply chain approach, 4 ways to achieve long-term supplier value, and top supply chain trends.
-
Stopping Attacks at the Windows Endpoint: The Lockdown Efficacy
By:
Type: Replay
No matter the type of attack or the initial attack vector, eventually threat actors need access to an endpoint to establish persistence and to serve as the launch point for any privilege escalation and lateral movement. And because every attacker’s capabilities are limited by the operating system they compromise, Windows remains a favorite target, with its’ many means of running code, traversing systems, and elevating privileges. A recent report showed that as many as 1 in 8 cyberattacks make it past security solutions and reach the endpoint, placing the battle for access to your environment squarely on your Windows’ endpoints. And while organizations like yours have endpoint solutions, not every solution provides the same levels of protection, making it necessary to take advantage of every means to secure the environment – which includes any native lockdown capabilities within Windows. So, just how well can native management solutions from Microsoft secure the Windows endpoint? In this Real Training for Free session, 4-time Microsoft MVP, Nick Cavalancia takes my seat as he first discusses: The reality of attacks reaching the endpoint Just how insecure is the default Windows endpoint? What MITRE has to say about the misuse of a compromised Windows endpoint Next up, you’ll hear from 18-time Microsoft MVP, Jeremy Moskowitz, as he covers the native limitations to consider when using Windows’ built-in policy management tools to secure the endpoint. Jeremy will also share practical strategies to address them. The session will focus on the limitations of the following native Windows endpoint management tools: - Local Administrator Password Service (LAPS) - USB GPO policy - Applocker - And more Jeremy will also discuss exploring alternative approaches and third-party solutions to optimize policy deployment.
-
How To Deploy A Password Policy
By: Specops Software
Type: eBook
This white paper provides an end-to-end guide for rolling out a new password policy in your organization. Learn how to plan, set up, deploy, and communicate the policy to keep your Active Directory secure. Download the white paper to get started.
-
BloodHound est un bon outil, mais vous méritez mieux !
By:
Type: Video
En 2014, des chercheurs français de l'ANSII présentent un document de recherche détaillant une approche innovante basée sur la théorie des graphes afin de cartographier les failles de sécurité au sein d'Active Directory. Cette recherche a ensuite été utilisée par des tiers pour développer le produit open-source BloodHound. Six ans plus tard, les mêmes chercheurs responsables de ces découvertes initiales sont allés encore plus loin afin d’explorer les limites de leur modèle en évoluant vers la théorie des hyper graphes dans l’objectif d’appliquer leurs recherches initiales au monde de l’entreprise. Rejoignez-nous pour découvrir comment la théorie des hyper graphes peut vous aider à résoudre les problèmes de sécurité AD les plus avancés. Alsid vous présente cet agenda : - Quels sont les chemins d'attaque et de contrôle ? - Evolution des chemins d'attaque et de contrôle - En quoi la surveillance des changements AD en temps réel est cruciale pour la sécurité du réseau ? - Survivre aux ransomwares grâce au suivi des changements de GPO - Naviguer dans le paysage complexe de la sécurité AD - Découvrir les changements cachés et les backdoors
-
A 5-step process to optimize PPI
By: Advantus
Type: White Paper
In recent years, physician preference items (PPI) have become a particularly hot topic, with various PPI selections accounting for 40% to 60% of total supply costs for most hospitals. Read this white paper to access a 5-step process to optimize PPI and help C-suite leaders reduce costs while still ensuring physicians get the tools they need.
-
[Cyber Quest] Choose Your Own Security Adventure
By:
Type: Replay
In the face of modern Windows desktop challenges, both Group Policy and MDM fall short. But one tool rises to the occasion, adding a new dimension of power and functionality: Netwrix PolicyPak. Indeed, as the stakes continue to get higher and the challenges more complex, Netwrix PolicyPak is increasingly indispensable for effective PC configuration management and security. Are you ready for a cyber adventure like no other? Join us for the PolicyPak Cyber Quest and watch our hero, 18X Microsoft MVP and godfather of Group Policy Jeremy Moskowitz, tackle some of the most challenging desktop management issues. Will he emerge victorious? In this webinar, you'll have the power to choose which problems Jeremy and Netwrix PolicyPak will face. So, gather your team, prepare your questions and get ready for an interactive adventure that will change the way you think about PC management forever. Here are some of the tough use cases you’ll have to choose from: - Eliminating local admin rights and blocking malware - Protecting USB and CD-ROM devices from malware and data exfiltration - Reducing GPOs and eliminate loopback - Migrate GPOs from on-prem to Cloud, Intune. or any MDM service Watch the PolicyPak Cyber Quest and take the first step towards a more secure digital future.
-
Prévention de la perte de données USB de votre entreprise
By:
Type: Video
À la fin des années 90 et au début des années 2000, les clés USB étaient très prisée. À l'époque, ils n'étaient pas très courants, disposaient de 8 Mo de stockage et le concept de fuite de données ou de détection de logiciels malveillants n'était pas considéré comme une menace majeure. Plus de deux décennies plus tard, non seulement ces périphériques sont plus rapides, mais ils sont beaucoup plus grands, souvent avec des capacités allant jusqu'à 1 téraoctet. Qu'est-ce qui pourrait tenir sur une clés de cette taille ? L'ensemble de votre dossier « Mes documents » et plus encore! Les dangers des clés USB non contrôlées comprennent l'entrée de données (pensez à la propriété intellectuelle d’autrui, ainsi qu'à la musique et aux films volés), la perte de données, la propagation de logiciels malveillants, etc. Le déploiement d'une solution de prévention des pertes de données peut aller bien au-delà des capacités de contrôle GPO (Group Policy Objects) ou de l'antivirus. Il peut également offrir de nombreuses façons de contrôler les clés USB. Dans ce webinaire, Julien Gourlaouen, Sr. Solutions Engineer de Fortra, partagera son expertise sur : • Dangers des clés USB non contrôlées • Fuites passées dans la presse • Options de contrôle des clés USB •Options de cryptage des données déplacées vers des clés USB Et des démos en direct bien sûr ! Présentateur - Julien Gourlaouen, Sr. Solutions Engineer, Fortra
-
Prévention de la perte de données USB de votre entreprise
By:
Type: Replay
À la fin des années 90 et au début des années 2000, les clés USB étaient très prisée. À l'époque, ils n'étaient pas très courants, disposaient de 8 Mo de stockage et le concept de fuite de données ou de détection de logiciels malveillants n'était pas considéré comme une menace majeure. Plus de deux décennies plus tard, non seulement ces périphériques sont plus rapides, mais ils sont beaucoup plus grands, souvent avec des capacités allant jusqu'à 1 téraoctet. Qu'est-ce qui pourrait tenir sur une clés de cette taille ? L'ensemble de votre dossier « Mes documents » et plus encore! Les dangers des clés USB non contrôlées comprennent l'entrée de données (pensez à la propriété intellectuelle d’autrui, ainsi qu'à la musique et aux films volés), la perte de données, la propagation de logiciels malveillants, etc. Le déploiement d'une solution de prévention des pertes de données peut aller bien au-delà des capacités de contrôle GPO (Group Policy Objects) ou de l'antivirus. Il peut également offrir de nombreuses façons de contrôler les clés USB. Dans ce webinaire, Julien Gourlaouen, Sr. Solutions Engineer de Fortra, partagera son expertise sur : • Dangers des clés USB non contrôlées • Fuites passées dans la presse • Options de contrôle des clés USB •Options de cryptage des données déplacées vers des clés USB Et des démos en direct bien sûr ! Présentateur - Julien Gourlaouen, Sr. Solutions Engineer, Fortra
-
6 health system purchasing committee archetypes
By: The Advisory Board
Type: eBook
This report analyzes six archetypes of health system purchasing committees and how they define value in drugs and devices. Understand how committees evaluate products across clinical quality, financial, and operational factors. Read the full research to learn how life sciences companies can best demonstrate value to these customers.
-
Supply Chain Digitization: Shifting the Paradigm to Support Value-based Care
By: Advantus
Type: White Paper
Under traditional supply chain scenarios, physicians have little visibility into the volume and cost of the products and devices they consume. Read this paper to understand how a digitized supply chain creates clearer consumption visibility, supports better patient outcomes, and reduces waste and expense.
-
Ubuntu 22.04の新しいActive Directory統合機能
By:
Type: Video
今回のトークについて Active Directory(AD)は、中規模から大規模の企業における最も一般的なユーザー/エンドポイントID管理システムです。UbuntuはAD統合機能をかなり前からサポートしていましたが、その機能はユーザー認証に限られ、Groups Policy Objectsやスクリプトなどの高度な機能は含まれませんでした。 Ubuntu Desktop 22.04では、システム管理者の要望に応え、画期的なクライアントとしてADsysを導入しました。これには次の機能があります。 OSにネイティブに組み込んだグループポリシーオブジェクト(GPO)の全面サポート 特権アカウントとしてタスクを実行するための特権管理機能 ログオン、ログオフ、起動、シャットダウンに対応するカスタムシェルスクリプト実行機能 今回のウェビナーでは、新しいAD統合機能について知り、現在Windowsクライアントの管理に使用しているのと同じツールで社内のUbuntuマシンを管理する方法についてご説明します。 Ubuntu Desktop、Ubuntu Advantage、または最新のActive Directory統合機能の詳細は、お問い合わせの上、アドバイザーにニーズをお聞かせください。
-
Streamlining Your Migration from Group Policy and SCCM to Intune and Entra ID
By:
Type: Replay
Transitioning to Microsoft Intune and Entra ID can be challenging for organizations accustomed to using Group Policy and SCCM for endpoint management and security. The differences in policies, granularity, and capabilities between Intune and SCCM often lead to security gaps, a poor end-user experience, and inefficiencies in managing endpoints. Fortunately, Netwrix offers a solution that simplifies this transition for Group Policy and SCCM Administrators. Watch how 18-time Microsoft MVP and Group Policy expert Jeremy Moskowitz to discover how Netwrix PolicyPak bridges the gaps in endpoint management and security during and after your migration to Entra ID and Microsoft Intune. In this webinar, you'll learn how Netwrix PolicyPak can: - Consolidate and merge legacy GPOs to streamline Intune migrations. - Ensure 100% policy parity between Microsoft Intune and Group Policy. - Address the security limitations of Intune's Endpoint Privilege Management add-on. - Integrate seamlessly with other Netwrix products, including Netwrix Auditor and Netwrix Privilege Secure. Don't miss this chance to learn how Netwrix PolicyPak simplifies your migration to Intune and Entra ID. Register now to secure your spot!
-
How a resilient health care supply chain affects patient care
By: Advantus
Type: Infographic
Supply chain excellence impacts health care quality and experience for patients, therefore, a resilient supply chain is crucial for delivering that care and keeping an eye on your bottom line. This infographic details five steps your organization should take to bolster more efficient health care supply chain management.
-
Ditch Your Print Servers
By:
Type: Video
See how eliminating your print servers with PrinterLogic reduces helpdesk tickets, removes security vulnerabilities, and enhances the end-user printing experience in a single solution. Discover how PrinterLogic's cloud-native, direct IP printing platform makes printer deployments easier without scripts and GPOs, and authenticates all users via IdP integrations. Find out more about serverless printing in this video.
-
10 steps to enhance the agility, security and performance of Active Directory
By: One Identity
Type: White Paper
Microsoft Active Directory (AD) and Azure AD (AAD) bring organization and standards to how identity and account data is managed and stored. One Identity Active Roles unifies your AD and AAD environments and enables identity and account data to be managed with agility, security and speed. Read on to learn more.
-
12 top enterprise risk management trends in 2023
By: TechTarget ComputerWeekly.com
Type: eGuide
Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.
-
Eliminate Your Print Servers and Deliver a Serverless Printing Infrastructure
By:
Type: Video
Learn how to eliminate your print servers and implement centrally managed direct IP printing on PrinterLogic’s easy-to-use SaaS platform. Kayla walks you through the two components that enable you to eliminate your print servers and get centrally managed direct IP printing: the Admin Console and the Workstation Client. Get an in-depth look at how to import your printer queues to the PrinterLogic Admin Console and manage your entire print environment from a single user interface. Discover how to deploy printers using various methods including Active Directory, IdP users, or IP address range—without worrying about stressful scripts or GPOs. Plus, find out how you can reduce print-related helpdesk tickets via the PrinterLogic Self-Service Installation Portal. Visit our website and social media pages to learn more about eliminating your print servers. Kayla walks you through the two components that enable you to eliminate your print servers and get centrally managed direct IP printing: the Admin Console and the Workstation Client. Get an in-depth look at how to import your printer queues to the PrinterLogic Admin Console and manage your entire print environment from a single user interface. Discover how to deploy printers using various methods including Active Directory, IdP users, or IP address range—without worrying about stressful scripts or GPOs. Plus, find out how you can reduce print-related helpdesk tickets via the PrinterLogic Self-Service Installation Portal. See attachment below learn more about our free 30 day trial.
-
Time to Go Serverless
By:
Type: Talk
Looking to streamline print management for your organization and get rid of print servers once and for all? Join us for a 30-minute demo of PrinterLogic’s secure SaaS print management platform to discover capabilities that empower you to decommission all print servers and manage your print environment from a centralized console. You’ll learn how to: ● Overcome the headaches and stresses of traditional print management ● Migrate all printers to the cloud with minimal downtime ● Deploy printers without GPOs and scripts ● Reduce printer-related helpdesk calls by empowering users to self-install printers ● Track and audit all print activity and generate reports that give insights into print costs All registrants will receive a recording of the event following the demo.
-
Time to Go Serverless
By:
Type: Talk
Looking to streamline print management for your organization and get rid of print servers once and for all? Join us for a 30-minute demo of PrinterLogic’s secure SaaS print management platform to discover capabilities that empower you to decommission all print servers and manage your print environment from a centralized console. You’ll learn how to: ● Overcome the headaches and stresses of traditional print management ● Migrate all printers to the cloud with minimal downtime ● Deploy printers without GPOs and scripts ● Reduce printer-related helpdesk calls by empowering users to self-install printers ● Track and audit all print activity and generate reports that give insights into print costs All registrants will receive a recording of the event following the demo.
-
Focus: how to avoid being hit by ransomware
By: TechTarget ComputerWeekly.com
Type: eGuide
In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.
-
Infographic: 5 questions to ask when creating a ransomware recovery plan
By: TechTarget ComputerWeekly.com
Type: Infographic
Companies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.
-
A Computer Weekly buyer's guide to managing paper processes
By: TechTarget ComputerWeekly.com
Type: eGuide
Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.
-
Die Zeit ist reif für Serverless: Eine umfassende Demonstration des sicheren, Cloud-nativen Druckmanagements
By:
Type: Talk
Suchen Sie nach Möglichkeiten, das Druckmanagement in Ihrer Organisation zu vereinfachen und Druckserver ein für alle Mal loszuwerden? Begleiten Sie uns zu einer 30-minütigen Demonstration der sicheren SaaS-Plattform für das Druckmanagement von PrinterLogic und erfahren Sie, wie Sie alle Druckserver abschalten und Ihre Druckumgebung von einer zentralen Konsole aus verwalten können. Sie werden lernen, wie Sie : Den Ärger und Stress überwinden, der mit dem traditionellen Druckmanagement verbunden ist. Alle Ihre Drucker mit minimalen Ausfallzeiten in die Cloud migrieren. Drucker ohne Verwendung von GPOs oder Skripten bereitstellen. Reduzieren Sie druckerbezogene Supportanrufe, indem Sie es den Nutzern ermöglichen, ihre Drucker selbst zu installieren. Alle Druckaktivitäten verfolgen und prüfen und Berichte erstellen, die Einblicke in die Druckkosten bieten.
-
Global Risks Report 2017
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals
-
The Crucial role of Identity Authentication and Privilege Management in Active Directory and Entra ID
By: One Identity
Type: White Paper
Effective identity authentication and privilege management are essential for securing corporate resources in Active Directory and Entra ID environments. Learn how to unify AD and Entra ID, automate identity processes, and implement best practices like least-privilege access and zero trust. Read the full white paper to enhance your IAM strategy.
-
Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
By: TechTarget ComputerWeekly.com
Type: Resource
Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
-
MicroScope - July-August 2024: Is it worth taking a risk?
By: MicroScope
Type: Ezine
In this issue, we take a closer look at the channel's approach to risk, with experts weighing in on with their approach to playing it safe versus taking steps towards innovation. Also read up on why the time is now to learn about AI-capable PCuse cases, as well as why the human factor should not be underestimated when it comes to AI
-
Il est temps de passer au sans-serveur
By:
Type: Talk
Vous cherchez à simplifier la gestion des impressions dans votre organisation et à vous débarrasser des serveurs d'impression une bonne fois pour toutes ? Rejoignez-nous pour une démonstration de 30 minutes de la plateforme SaaS sécurisée de gestion des impressions de PrinterLogic, et découvrez comment vous pouvez désactiver tous les serveurs d'impression et gérer votre environnement d'impression depuis une console centralisée. Vous apprendrez à : Surmonter les tracas et le stress liés à la gestion traditionnelle des impressions Migrer toutes vos imprimantes vers le cloud avec un minimum de temps d'arrêt Déployer des imprimantes sans utiliser de GPOs ni de scripts Réduire les appels au support liés aux imprimantes en permettant aux utilisateurs d'installer eux-mêmes leurs imprimantes Suivre et auditer toutes les activités d'impression et générer des rapports offrant des insights sur les coûts d'impression Tous les inscrits recevront un enregistrement de l'événement après la démonstration.
-
Are we trusting social networks too much?
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
-
Royal Holloway: Driverless vehicle security for military applications
By: TechTarget ComputerWeekly.com
Type: Research Content
Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
-
Step-by-step disaster recovery planning guide
By: TechTarget ComputerWeekly.com
Type: eBook
IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.
-
To hack back or not to hack back ...
By: Hewlett Packard Enterprise
Type: eGuide
This e-guide discusses hacking back as a viable option to combat hacking attempts. Expert Kevin Beaver discusses the merits and drawbacks of an "offense is the best defense" approach to security and how to implement more permanent security tools moving forward.
-
The Cybersecurity ABC's Explained
By: Adlumin
Type: eBook
This e-book provides an overview and comparison of three key threat management services - Endpoint Detection and Response (EDR), Managed Detection and Response (MDR), and Extended Detection and Response (XDR). It offers insights to help you choose the right solution to maximize your cyber protection. Read the full e-book to learn more.
-
CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa
By: TechTarget ComputerWeekly.com
Type: Ezine
Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?
-
Threat management: Essential guide
By: TechTarget ComputerWeekly.com
Type: eGuide
Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
-
Disaster recovery and business continuity: Essential guide
By: TechTarget ComputerWeekly.com
Type: eGuide
Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.
-
What's Changed After SolarWinds SUNBURST?
By: TechTarget
Type: Resource
The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.
-
AD Group Management and Attestation
By:
Type: Video
What if there was a way to simplify and streamline object and group security and management within AD and Entra ID and give you more time to focus on other tasks? Active Roles is here to help. Stream this webinar to learn how Active Roles can help you: - Automate policies - Introduce AD attestation functionality - Allow group managers to control group membership - Enable periodic group membership validation
-
AD Group Management and Attestation
By:
Type: Replay
What if there was a way to simplify and streamline object and group security and management within AD and Entra ID and give you more time to focus on other tasks? Active Roles is here to help. Stream this webinar to learn how Active Roles can help you: - Automate policies - Introduce AD attestation functionality - Allow group managers to control group membership - Enable periodic group membership validation
-
Ensure the security of your endpoint devices: Expert tips
By: Sentinel Labs, Inc.
Type: eGuide
Endpoint devices are often the root cause of data breaches but finding the best endpoint security for your enterprise is a complex, ever-changing task. In this e-guide, experts Kevin Tolly and Eric Cole uncover 6 ways to improve endpoint device security and what features to focus on in your search for an endpoint security tool.
-
PRI Digital Forum: EMEA - Breakout 1B. EU sustainable finance policy
By:
Type: Video
EU sustainable finance policy: what’s on the horizon? This session discusses what's coming up in the European policy sphere, and how investors should prepare for the incoming regulations. Speakers: Carey Evans, Managing Director, Global Policy BlackRock Nadia Humphreys, Business Manager, Sustainable Finance Solutions, Bloomberg Johanna Köb, Head of Responsible Investment Zurich Insurance Group Carina Silberg, Head of Governance and Sustainability, Alecta Alyssa Heath, Head of EU & UK Policy, PRI
-
PIP19 - The EU taxonomy: What is it, and how should it be used?
By:
Type: Video
The taxonomy proposes a list of economic activities that are considered environmentally sustainable for investment purposes. This session will: • outline what the taxonomy is, and the methodology used to determine it; • discuss how the taxonomy can be applied to service lines, and what to do next; • explore test cases on using the taxonomy in practice. This session will be held under Chatham House rules. Fouad Benseddik, Director, Vigeo Eiris Nathan Fabian, Chief Responsible Investment Officer, PRI; Rapporteur, Taxonomy, EU Technical Expert Group Alyssa Heath, Head of EU & UK Policy, PRI Brenda Kramer, Senior Advisor, Responsible Investment, PGGM; Member, EU Technical Expert Group Helena Viñes Fiestas, Global Head of Stewardship and Policy, BNP Paribas Asset Management; Member, EU Technical Expert Group
-
Insuring the net-zero transition: Evolving thinking and practices
By:
Type: Talk
A white paper produced by the Net-Zero Insurance Alliance. This paper outlines the evolving thinking and practices via the work of the Net-Zero Insurance Alliance (NZIA), a group of over 20 leading insurers representing about 12% of world premium volume, to address the net-zero challenge in the context of insurance underwriting portfolios. The NZIA is a UN-convened and member-led alliance that supports its members as they work towards decarbonising their underwriting portfolios by individually setting science-based intermediate targets and reporting on their progress annually and publicly. The NZIA also advocates for and engages in governmental policies for a science-based and socially just transition of economic sectors to net zero. Speakers: Butch Bacani, Programme Lead, UNEP's Principles for Sustainable Insurance John Scott, Head of Sustainability Risk, Zurich Insurance Group Lucy McCracken, Senior Manager, Group Public Policy & Sustainability, Aviva Sheri Wilbanks, Head of P&C Climate and Sustainability, Group Risk Management AXA