TECH Talk – Breach, Repeat: Understanding Recurrent Cyberattacks

Upcoming Events

HackerTrack Online Game

A ransomware incident occurs every 11 seconds. Our free online game, Veritas HackerTrack, gives you a chance to defeat bad actors and exact revenge. Compete against your peers and win prizes while you learn how to protect, detect and recover from ransomware. Register for free and play today!

Old Skool Vs. New Skool Security

Even if your preferred Vans style is old skool, your security doesn’t have to be! It’s time to rethink your firewall. Join DataEndure and Guardicore to get a glimpse into why the world is shifting away from legacy and next generation firewalls. Hans Johnson, Lead Security Engineer at Guardicore, will demonstrate the advantages of how a […]

Comedy Show & Beer Tasting with Dave Williamson

Closeout your workday with some untapped laughs! You’ve earned it! You're invited to join an exclusive community of cybersecurity leaders for an intimate cybersecurity-themed comedy show and craft beer tasting, virtually! We’ll learn the ins and outs of how beer is made and what notes to look for when trying beers, with Common Space Brewery based in […]

CIO Visions Leadership Virtual Summit – July 2022

DataEndure continues its sponsorship of  CIO VISIONS Leadership Virtual Summit, an invitation-only IT executive summit happening on July 18th-22nd 2022. With over 30+ sessions available on demand and access to the brightest minds in IT, this solutions-based event is completely different from anything else happening virtually – and delivers tangible results and rewards!

January 2023 TECH talk – Top 3 Security Priorities for 2023

We’ve put our list together and have checked it twice–and during January’s TECH talk we will be sharing DataEndure’s Top 3 Security Priorities for 2023. With an eye on technology trends and ears tuned into customer challenges and requirements, we’ll share the top areas to consider this year as you evaluate the health and maturity […]

June 2023 TECH Talk – Why Email Security is Falling Behind

Hard to believe, but 93% of cyberattacks start with email. It’s an “old school” attack vector - and one that simply can't keep up to secure against the volume and sophistication of attacks coming at it. This includes a tidal rise in business email compromise (BEC)—with pretexting attacks alone doubling in just a year. Adversaries […]

July 2023 TECH Talk – Unintentional Insider Threat: Is ChatGPT a Friend or Foe?

In this month’s TECH Talk, we’ll address the critical concern of unintentional business threats arising from employees putting sensitive company information into ChatGPT's Large Language Model (LLM). While ChatGPT can be a valuable tool for various tasks, the potential risks of exposing confidential data, data breaches, and compromised security cannot be ignored. Join us as […]

August 2023 TECH Talk – Small Steps, Big Protection: Crafting Your Cybersecurity Roadmap

There’s an expectation today that companies will serve as a guardian of confidential data as part of doing business. As cyberattacks increase in volume and sophistication, waiting for a compelling event to bolster your security strategy is a risky gamble. Join us as we delve into how to build a cybersecurity strategy in manageable, incremental […]

Sept 2023 TECH Talk – MGM Breach: Preparing for the Inevitable

The MGM breach serves as a wake-up call for all organizations. If they can be breached, anyone can be breached. Back in the day, cybercriminals had to get their hands dirty—literally. They'd go dumpster diving for sensitive documents and information. Fast forward to today, and social networks have become the new treasure trove. In the […]

TECH Talk – Data Exposure from Open Directory Listings 

Millions of files with potentially sensitive data have been exposed by 314,000 distinct internet-connected devices and servers with open directory listings. In this month’s TECH Talk, we’ll dive into the recent CyberScoop reporting and Censys research. Open directories provide cybercriminals with a treasure map to a company’s sensitive information such as financial data, backups, network packet capture […]

+ +