TECH Talk – Breach, Repeat: Understanding Recurrent Cyberattacks

Upcoming Events

January 2023 TECH talk – Top 3 Security Priorities for 2023

We’ve put our list together and have checked it twice–and during January’s TECH talk we will be sharing DataEndure’s Top 3 Security Priorities for 2023. With an eye on technology trends and ears tuned into customer challenges and requirements, we’ll share the top areas to consider this year as you evaluate the health and maturity […]

February 2023 TECH talk – Interpreting the Global Cyber Outlook for 2023

One of the storylines coming out of the recent World Economic Forum was the Global Cyber Outlook for 2023. Of note: 86% of business leaders believe there will be a catastrophic cyber-attack in the next 2 years and 43% feel it will have a material impact on their business. Billionaire Warren Buffett was quoted as […]

March 2023 TECH talk – Why Endpoint Security Isn’t Nearly Enough

“Secure the endpoint!” While this has become the mantra for solving the cybersecurity challenge, the endpoint is just 1 of 4 critical factors that contribute to a solid security stance. Endpoint security isn’t nearly enough. The growing threat of increasingly sophisticated cyberattacks requires a security strategy that delivers more visibility into every application and user […]

April 2023 TECH talk – The Security Implications of ChatGPT

The meteoric rise of ChatGPT has taken the world by surprise—and there’s no putting the genie back in the bottle. In this 30-min talk, we’ll take a beat to look at the cybersecurity implications. Like all powerful tools, ChatGPT can be used for good and for ill. While we expect a future wave of advancements that […]

May 2023 TECH Talk – Why Layered Defense is Critical for Effective Cybersecurity

“Layered security" is just the starting point in today’s rapidly evolving threat landscape. A layered defense strategy extends beyond the basics. It’s about deploying multiple, specialized tools at each security layer—to provide a response tactic tuned for each type of attack. As attacks increase in speed and sophistication, we all need increased agility to proactively […]

June 2023 TECH Talk – Why Email Security is Falling Behind

Hard to believe, but 93% of cyberattacks start with email. It’s an “old school” attack vector - and one that simply can't keep up to secure against the volume and sophistication of attacks coming at it. This includes a tidal rise in business email compromise (BEC)—with pretexting attacks alone doubling in just a year. Adversaries […]

July 2023 TECH Talk – Unintentional Insider Threat: Is ChatGPT a Friend or Foe?

In this month’s TECH Talk, we’ll address the critical concern of unintentional business threats arising from employees putting sensitive company information into ChatGPT's Large Language Model (LLM). While ChatGPT can be a valuable tool for various tasks, the potential risks of exposing confidential data, data breaches, and compromised security cannot be ignored. Join us as […]

August 2023 TECH Talk – Small Steps, Big Protection: Crafting Your Cybersecurity Roadmap

There’s an expectation today that companies will serve as a guardian of confidential data as part of doing business. As cyberattacks increase in volume and sophistication, waiting for a compelling event to bolster your security strategy is a risky gamble. Join us as we delve into how to build a cybersecurity strategy in manageable, incremental […]

Sept 2023 TECH Talk – MGM Breach: Preparing for the Inevitable

The MGM breach serves as a wake-up call for all organizations. If they can be breached, anyone can be breached. Back in the day, cybercriminals had to get their hands dirty—literally. They'd go dumpster diving for sensitive documents and information. Fast forward to today, and social networks have become the new treasure trove. In the […]

TECH Talk – Data Exposure from Open Directory Listings 

Millions of files with potentially sensitive data have been exposed by 314,000 distinct internet-connected devices and servers with open directory listings. In this month’s TECH Talk, we’ll dive into the recent CyberScoop reporting and Censys research. Open directories provide cybercriminals with a treasure map to a company’s sensitive information such as financial data, backups, network packet capture […]

+ +