Hi {NAME}, The Register: Tech Resources - 13 July 2023 ### The principles of secure communication We assume that even using consumer messaging apps we can communicate securely these days. And that remote working on our own phones and devices wonât make our comms any less secure. And, that the risk of our sensitive messages being intercepted or leaked are small. Wrong, wrong, wrong. So how do you secure your messaging infrastructure so your comms arenât compromised in a cyberattack, and how would you recover if that happens? How do you ensure that the way you communicate is not only secure, but compliant? And, how do you combat the insidious creep of shadow IT being used for communications within the enterprise? In this special regcast join Dr Andy Lilly from Armour Comms, who will explain the risks you run and how to avoid them, and a very special guest from NCSC, who will explain his organisationâs Secure Communication Principles and how to implement them. NOTE: Our NCSC guest is available for the live broadcast only! You wonât be able to watch them on catch up. So make sure you sign up for the live event! You will hear: * The risks from insecure communications, and who has been caught out * The NCSC Secure Communications Principles, why they exist, and how to implement them * How to create and maintain a workable secure communications infrastructure View Now ### Connectivity - the key to helping you go further 72% of organisations say old or outdated tech impacts their ability to operate efficiently, according to our recent research. But when 37% say rising costs are their biggest challenge, how can you invest in what you need while making the most of what you already have? This webinar will help you answer that question. Weâre bringing together experts from both the public and private sectors to explore how the right technology, underpinned by the right connectivity, can unlock efficiencies across your organisation. From making collaboration effortless to removing time-consuming tasks and improving your employee experience, weâll show you how to unlock the full potential of your people in a way that keeps your finance department smiling. Speakers: Catherine Amran â Director of Business â Virgin Media O2 Business Martin McFadyen â Head of Public Sector â Virgin Media O2 Business Kenn Walters â ISG Global Lead Analyst and Executive Advisor â ISG This webinar is brought to you by Virgin Media O2 Business. View Now ### Deliver Faster Time-to-Value with Enterprise Data Services for Containerized Apps from Nutanix For cloud-native applications, organizations often struggle with provisioning and managing storage at the application level â itâs due to the predominant focus on container-level management by Kubernetes storage drivers. This leads to increased time, reduced efficiency, and complications in managing storage for cloud-native applications. In fact, when adopting cloud-native technologies, Gartner recommends organizations to select storage products closely aligned with the developer workflow tools that can be directly integrated with the application layer for portability, scaling, and data protection. Join The Registerâs James Hayes in discussion with Nutanix expert Harsha Kotikela (Director of Product and Solutions Marketing) to discover how Nutanix enables organizations to re-define cloud-native storage management by moving storage operations up to the application level. In this webinar you will learn how to: * Accelerate application provisioning * Define application-level attributes for persistent storage * Provide data services in minutes * Streamline operations of data services Signup Now ### Top cloud threats that you never knew existed â and pragmatic steps to avoid them Cloud adoption is expanding rapidly, and with that expansion comes new complexities. The speed of growth and change in the cloud creates an ever-changing threat landscape. Wiz Research is at the forefront of the cloudâs threat landscape and is behind the discovery of significant vulnerabilities such as ChaosDB, ExtraReplica, AttachMe, BingBang, and OMIGOD. In this session, we will thoroughly examine the latest cloud threats identified by the Wiz Research team. This will include design gaps affecting cloud customers, the dangers of insecure tenant isolation, and the risks associated with silent agents. The information presented will summarise insights gathered from various research efforts , including Wiz research and general community research. The Registerâs James Hayes is joined by Shir Tamari, Head of Vulnerability Research at Cloud Security Specialist Wiz, to discuss the emerging trends in cloud vulnerabilities and the changing attack patterns for cloud-based resources. You will learn about: * Faulty cloud configurations introduces an additional attack vector that can compromise data security * Insights into the risks of silent agents that resulted in cloud vulnerabilities like OMIGOD * ChaosDB resulted from a trivial exploit in a remote account takeover of Azure's flagship database, impacting numerous F500 companies * Insecure tenant-isolation implementation resulted from a trivial exploit in a remote account takeover of Azure's flagship database, impacting numerous F500 companies * Pragmatic guidance and tools for dev, ops, and security teams to reduce the risk of these threats View Now ### The intersection of network security and Wi-Fi: a guide for professionals Wi-Fi is a wonder of the digital era, enabling everything from laptops, mobile devices, and IoT devices to wirelessly connect and exchange all kinds of data. Successive generations of Wi-Fi have striven to make the technology more resilient, secure, and easier to deploy. But the evolution of Wi-Fi throws up almost as much complexity as it aims to resolve â complexity thatâs often costly and time-consuming for the market to manage. The transition of networks to WPA3 requires device and network testing to ensure compatibility. Management solutions similarly present secure integration challenges for Wi-Fi equipment vendors and network operators. The good news is that progress is being made. Join The Registerâs James Hayes with experts Jonathan Davis, Slava Dementyev and Kate Adam at Juniper Networks, and Viszen Securityâs Jennifer Minella, as they discuss Wi-Fiâs past, present and future. In this webinar you will learn about: * How Wi-Fi security is evolving and the challenges that are being resolved * How complexity caused by Wi-Fi use-case proliferation is being made manageable * How standards-driven security is being reinforced by integrating enterprise controls * How Juniper is helping network administrators address concerns around NAC resilience View Now ------------------------------------------------------------------------ This email was sent to {EMAIL} You can update your preferences here: or unsubscribe from this list: Situation Publishing Ltd, 315 Montgomery Street, 9th & 10th Floors, San Francisco, CA 94104, USA The Register and its contents are Copyright © 2023 Situation Publishing. All rights reserved. Find our Privacy Policy here: