Tag Archive for: Webinar

Zimperium Webinar: Top 5 Things to Know About Mobile Security – January 9, 2019 – Business Wire

Zimperium Webinar: Top 5 Things to Know About Mobile Security – January 9, 2019  Business Wire

Zimperium will discuss the key elements of mobile security in 2019 based on millions of data points in a webinar on January 9, 2019.

“mobile security news” – read more

Zimperium Webinar: Top Mobile Security Predictions for 2019 – December 12, 2018 – Associated Press

Zimperium Webinar: Top Mobile Security Predictions for 2019 – December 12, 2018  Associated Press

DALLAS–(BUSINESS WIRE)–Dec 5, 2018–Zimperium is providing customers, media and the general public with a live webinar in which they will learn about …

“mobile security news” – read more

Your webinar invite: Australia’s new data breach laws and how to revamp your security – SecurityBrief Australia


SecurityBrief Australia

Your webinar invite: Australia's new data breach laws and how to revamp your security
SecurityBrief Australia
Gemalto's Breach Level Index reported 1.4 billion data records compromised worldwide in 2016, up 86% from 2015. Closer to home, there were 44 & 16 voluntarily reported breaches in Australia and New Zealand. With the new Privacy Amendment (Notifiable …

and more »

data breach – Google News

See a real attack on a virtual network in this free webinar by Nehemiah Security

See a real attack on a virtual network

Graham Cluley Security News is sponsored this week by the folks at Nehemiah Security. Thanks to the great team there for their support!

Nehemiah Security operates throughout an enterprises’ network to make security operations – and the business – run better.

Security teams struggle to quantify the protection levels of their networks, endpoints and data assets. Nehemiah Security’s AtomicEye RQ (Risk Quantifier) provides organizations with a security scorecard as well as actionable suggestions on how to better resist a vast range of cyberattacks.

Watch the free webinar to see AtomicEye RQ:

  • Virtualize a complex environment
  • Prepare an experiment using real exploits
  • Launch the attack
  • Quantify the results

Can you justify your security spend?

See how AtomicEye RQ can help you measure security risks in both cyber and financial terms, then calculate the benefits of specific changes – before you invest to implement them.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Graham Cluley