Security
Security Insights
Filter by Content Types
- No options
1039 results found
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Aug 21, 2025 • 10am
Hands-On Lab Workshop: Juiced Shop, OWASP
Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Juiced Shop Lab. This workshop is designed to introduce fundamental concepts of web application security testing through our CTF mini-games series, JuicedShop. After the live lab, you'll have a better understanding of how to use Burp Suite and will be able to apply those skills to more challenges in our JuicedShop series. This one-hour event is limited to a small group of participants who will have the opportunity to engage in Q&A during the session. Attendees are encouraged to actively participate by launching the lab themselves alongside the presenter for a hands-on experience.
Webinar
•Jul 24, 2025 • 11am
Hands-On Lab Workshop: Cyera Foundations
Join us for the Virtual Lab Workshop! During this exclusive session, the hostwill introduce the Cyera Foundations Lab and Cyera Data Security Platform learning path. This workshop is designed to provide an environment to gain hands-on experience with the fundamental features of Cyera. This one-hour event is limited to a small group of participants who will have the opportunity to engage in Q&A during the session. Attendees are encouraged to actively participate by launching the lab themselves alongside the presenter for a hands-on experience.
Webinar
•Jul 17, 2025 • 11am
🚩Disarm Me CTF: Hack, Decrypt, Disable — Featuring Willa
This is a red team style capture the flag event that puts you and your team in the role of hackers trying to break into an emulated internal network. Assemble a team of 3 to 4 players ready to dig into vulnerabilities, decrypt systems, and disable key services before time runs out.
This time, you'll have Willa on your side. Willa is a new AI teammate built to guide you through the game with real-time tips, helpful insights, and resource suggestions. She can even flag a live proctor if something needs attention. Whether you're stuck on a flag or just need a nudge, Willa has your back.
Get ready to think like an attacker, act fast, and work as a team.
Cyber Range
•Jul 17, 2025 • 9am
Partner POV | Transforming Recovery Operations: Pure Storage and Commvault's Partnership in Cyber Resilience
Commvault, a global leader in cyber resilience, is both a trusted partner and customer of Pure Storage. The company leverages FlashBlade//S to protect its most critical workloads.
Partner Contribution
•Jun 27, 2025
A CTO'S Primer on Q-Day: Part 5 - How Q-Day Threatens The Mid-Market
Quantum computing is rapidly approaching, and mid-market businesses are especially vulnerable. Without early preparation, encrypted data may be exposed, leading to breaches, financial loss and reputational damage. By adopting quantum-resistant encryption and assessing vulnerabilities now, businesses can stay secure, build trust and lead in a future where quantum readiness becomes a competitive advantage.
Blog
•Jun 27, 2025
The Versatile Data Center Smart Switch: Cisco N9300
The Cisco Nexus N9300 Smart Switch revolutionizes data center infrastructure with its convergence of high-performance switching, network security and application services. Featuring Cisco Silicon One ASICs and a Data Processing Unit, it offers intelligent, service-aware capabilities. Optional Hypershield enhances zero-trust security, making it ideal for AI, hybrid cloud and security-conscious environments.
Blog
•Jun 25, 2025
Practical Zero Trust Security with Fortinet Universal ZTNA
Fortinet Universal ZTNA delivers practical Zero Trust security through continuous, context-aware access control, endpoint verification and centralized analytics enabling organizations to protect users and applications across hybrid environments.
Blog
•Jun 24, 2025
A CTO'S Primer on Q-Day: Part 4 - The Impact on Global Enterprises
Q-Day, the impending quantum computing breakthrough, threatens to render current encryption obsolete, exposing sensitive data across industries. As cyber criminals prepare to exploit this, organizations must urgently adopt quantum-resistant measures. The race against time is on. Proactive adaptation is crucial to safeguard digital security and ensure resilience in a post-quantum world.
Blog
•Jun 24, 2025
A CTO'S Primer on Q-Day: Part 3 - Building the Business Case for PQC
Quantum computing threatens current encryption, urging immediate action. Post-quantum cryptography (PQC) is essential for safeguarding data and maintaining trust. CTOs and CISOs must lead strategic transitions, aligning with regulatory timelines and leveraging external pressures. Early adoption ensures market leadership and resilience, transforming PQC from a technical task to a business-critical investment.
Blog
•Jun 24, 2025
A CTO'S Primer on Q-Day: Part 1 - The Post-Quantum Problem
Quantum computing's potential to break current encryption standards, known as Q-Day, poses a significant threat to cybersecurity. As experts race to develop post-quantum cryptography, balancing the risks and revolutionary potential of quantum technology is crucial for safeguarding our digital future.
Blog
•Jun 24, 2025
Transforming Healthcare with SD-Access
Cisco's Software-Defined Access brings 5 key network benefits to healthcare organizations.
Article
•Jun 23, 2025