Webinar October 14, 2021: Active Directory Security – What Needs Immediate Priority!

Securing Active Directory (AD) is no longer an option, but a mandate. With attacks on AD at an all-time high, companies overlooking this vulnerable point of entry are being punished both monetarily and with loss of production. Watch as Craig Stevenson, CEO of HyperQube and Derek Melber, Chief Technology & Security Strategist at Tenable as they:

  • Discussed the importance of AD security and vulnerability management prioritization

  • Reviewed common attack paths and the importance of AD to attackers

  • Demonstrated how to disrupt AD attacks

  • Provided a live demo of AD testing

HyperQast EP4 – PT 2: Securing Active Directory to Disrupt Ransomware Attacks

HYPERQAST:  A TECHNOLOGY PODCAST.

Hosted by Craig Stevenson, alongside a bevy of subject-matter experts, they’re digging into topics from Cybersecurity to software development and everything in between!

 

EP4 – Part 2: Securing Active Directory to Disrupt Ransomware Attacks

What is Ransomware? And how does it move throughout an organization? Craig along with Derek Melber, the Chief Technology & Security Strategist at Tenable (who is also a 17 time Microsoft MVP, in both Active Directory and Group Policy) discuss what is Ransomware, its origins, then dive into the mind of an attacker and review the different stages of an attack and how Active Directory fits in.

HyperQast EP4 – PT 1: Active Directory Security: Historical Lessons and Today’s Issues

HYPERQAST:  A TECHNOLOGY PODCAST.

Hosted by Craig Stevenson, alongside a bevy of subject-matter experts, they’re digging into topics from Cybersecurity to software development and everything in between!

 

EP4 – Part 1: Active Directory Security: Historical Lessons and Today’s Issues

Active Directory (AD) has been a part of Windows Security since its release with Windows 2000 Server. Craig along with Derek Melber, the Chief Technology & Security Strategist at Tenable (who is also a 17 time Microsoft MVP, in both Active Directory and Group Policy) discuss the history of Active Directory, as well as the 5 must know AD security practices.

WEBINAR SERIES: KNOW THY ENEMY THRU TESTING AND VALIDATION

Episode 3:  Active Directory Security: What Needs Immediate Priority

Securing Active Directory (AD) is no longer an option, but a mandate. With attacks on AD at an all-time high, companies overlooking this vulnerable point of entry are being punished both monetarily and with loss of production.

On Thursday October 14th, 2pm ET join Craig Stevenson, CEO of HyperQube and Derek Melber, Chief Technology & Security Strategist at Tenable as they:

  • Discuss the importance of AD security and vulnerability management prioritization

  • Review common attack paths and the importance of AD to attackers

  • Demonstrate how to disrupt AD attacks

  • Provide a live demo of AD testing

Click the image below and register TODAY!

HyperQast EP3: Cyber Ranges & ZTEdge with Dr. Zero Trust

HYPERQAST:  A TECHNOLOGY PODCAST.

Hosted by Curious Craig (Craig Stevenson), alongside a bevy of subject-matter experts they’re digging into topics from Cybersecurity to software development and everything in between!

 

EP3: Cyber Ranges & ZTEdge with Dr. Zero Trust

Cyber Ranges are an important asset to leverage for a Zero Trust implementation.  ZTEdge is a Zero Trust cloud security platform that cuts complexity, reduces cyber-risk, and improves performance, at half the cost of other solutions. Curious Craig along with Dr. Zero Trust (Chase Cunningham) discuss the difficulties of building your own Cyber Range as well as how ZTEdge supports a Zero Trust implementation.

Webinar August 25, 2021: Container Vulnerability Validation

Containers offer speed and convenience, but sacrifice security. How do you validate and prioritize container vulnerabilities?  Watch Craig Stevenson, CEO of HyperQube and Greg Dharma LePard, Sales Engineer from Rezilion as they:

  • Demonstrated how to build live infrastructure with the HyperQube Cyber Range

  • Used Rezilion Prioritize to:

    • Validate and prioritize container vulnerabilities

    • Identify and remove unused, bloated code

    • Create a catalog of certified container images