BUSINESS TECHNOLOGY MEDIA COMPANY
Companies
Sectors
Malware

Panda intros free cyber security webinars

Read time 1min 50sec
Jeremy Matthews, regional manager Panda Security Africa.
Jeremy Matthews, regional manager Panda Security Africa.

Widespread ransomware attacks and breaches have littered the headlines in the last few years, making it clear that traditional methods of protection are no longer enough to prevent attacks.

Catching the intruder in his tracks - advanced threat hunting

Is your AV causing more harm than good?

Centralised device management from the cloud

So says Jeremy Matthews, regional manager, Panda Security Africa. He adds that businesses need to adopt a new approach to cyber security and leverage next-gen endpoint detection and response (EDR) and remote monitoring and management (RMM) technologies.

The threat landscape has changed significantly over the last few years, with attacks becoming more targeted and sophisticated, notes Matthews. This, in conjunction with increased regulation in the form of GDPR and POPIA, and a surge of IoT devices, makes securing and managing the organisation's network a challenge.

Free webinars

To help address this challenge, Panda is debuting a free webinar series, aimed at giving insight into the evolution of cyber threats and the key challenges faced by businesses in SA. It will also clear up some of the common misconceptions around security solutions and discuss a new model for creating cyber-resilient organisations.

Matthews says the first webinar, 'Catching the intruder in his tracks', will take an in-depth look at the evolution of threats, and offer insights into how forensic data can be used to hunt for threats, giving examples of attack stories and case studies.

'Is your AV causing more harm than good?', the next in the series, will discuss why traditional AV products can leave organisations vulnerable, as well as why some international governments have chosen to ban certain security providers. It will also look at whether AV technology meets compliance needs under GDPR and POPIA.

The series will end with 'Centralised device management from the cloud', which will examine how organisations can leverage centralised device management tools to improve efficiencies and take control of their IT infrastructure.

See also