Discover Security Events in Endpoint Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
20 hours from now
Managing Kubernetes at scale becomes harder as teams juggle multiple clusters, distributions, and disconnected tools. This webinar focuses on how a unified Kubernetes platform can reduce complexity, control costs, and improve security without locking organizations into a single vendor. The session explains how networking, network security, and observability can be consolidated into one consistent operating model.
The discussion highlights how organizations can replace tool sprawl, improve workload portability across Kubernetes environments, and securely scale to multi cluster deployments. Attendees will see how a unified approach supports stronger security controls, simpler operations, and greater flexibility when expanding Kubernetes environments across teams and regions.
20 hours from now
Get practical guidance on using N-able security and compliance tools to protect customer environments more effectively. This session focuses on current security updates, patching considerations, product enhancements and roadmap direction, helping teams understand how recent changes impact real world security operations.
Participants can raise specific security questions, review best practices for keeping systems secure and hear expert insight on emerging risks and compliance needs. The discussion also covers Patch Tuesday updates and other security developments that MSPs should be aware of. This office hours session is designed for teams that want clearer direction on maximizing N-able security products while maintaining strong protection for their customers.
20 hours from now
Effective patch management is not just about fixing vulnerabilities, it is also about protecting productivity. This webinar focuses on how patching strategies can be designed to strengthen security while minimizing disruption for end users. Using real world policy configuration data from NinjaOne and insights from experienced IT product leaders, the session highlights what works in day to day operations.
The discussion covers practical best practices for balancing security requirements with operational efficiency. Attendees will see how thoughtful patching policies help reduce user friction, maintain system stability and support smoother IT operations overall. This session is ideal for teams looking to improve patch outcomes without compromising user experience.
1 day from now
This webinar focuses on the upcoming retirement of the UK National Cyber Security Centre’s Mail Check and Web Check services and what this change means for organizations that rely on them. The session explains the impact of losing free email security and web vulnerability scanning, along with the reasoning behind the decision as part of the NCSC Active Cyber Defence 2.0 roadmap.
Attendees will gain clarity on how to evaluate replacement solutions, including email authentication, web asset scanning, certificate monitoring, alerting, and external attack surface management tools. The discussion also outlines migration timelines and practical next steps to help organizations maintain security, compliance, and resilience before the services are withdrawn.
1 day from now
Kubernetes teams are facing rising complexity as networking, security, and observability tools continue to pile up across multiple distributions. This webinar focuses on how tool sprawl and vendor lock in increase costs, complicate operations, and limit flexibility in modern Kubernetes environments. The session explains why managing fragmented tooling has become a common challenge as adoption grows.
The discussion shows how Calico provides a unified networking and network security approach that works consistently across Kubernetes distributions. Attendees will see real customer examples of organizations replacing multiple tools, reducing operational overhead, and avoiding vendor dependence. The webinar is designed for teams looking to simplify Kubernetes operations, improve portability, and scale securely with greater control.
2 days from now
This session showcases how Morphisec protects Linux environments from ransomware threats that are now rapidly evolving across enterprise infrastructure. The demo focuses on how attackers target Linux systems, from exploiting outdated software to encrypting shared network storage, and shows how Morphisec blocks these techniques before they cause damage. Real world examples illustrate how ransomware campaigns operate and why Linux has become a prime target for cybercriminals.
Through a guided demonstration, attendees will see how kernel level eBPF based protection prevents ransomware execution, how network file share encryption attempts are detected and stopped and how automated decoys and isolation safeguard business critical files. The session also highlights how Morphisec identifies vulnerable software across Linux environments to reduce exposure and strengthen overall resilience against ransomware attacks.
1 week from now
This virtual cybersecurity forum focuses on how AI and automation are reshaping security operations and changing the way teams defend against modern threats. The discussion centers on current adversary trends, practical AI driven innovation and how automation can reduce operational strain while improving response speed and accuracy.
Built for security leaders, the event highlights how advanced tooling can strengthen defenses, streamline daily workflows and create measurable business value. Attendees will gain a clearer view of where security operations are headed and how AI and automation fit into the future of effective cyber defense.
1 week from now
AI is reshaping the cyber threat landscape in ways that go far beyond marketing claims, and this webinar takes a realistic look at what that shift means in practice. The session examines how AI is being used by both attackers and defenders, with a focus on where it introduces new risks, disrupts security at critical moments and blurs the boundary between classic social engineering and automated attacks.
Built on Trend Micro’s 2026 security predictions, the discussion explains how AI often acts as an enabling layer that helps existing threats evolve while accelerating the emergence of new ones. Attendees will gain insight into the underlying dynamics that will influence cyber risk in the years ahead and better understand which factors are likely to matter most as AI continues to shape modern attack methods and defense strategies.
1 week from now
Get direct guidance on protecting and recovering critical data using N-able Cove Data Protection in this interactive office hours session. The discussion is designed for teams that want clearer answers on backup and recovery workflows, product capabilities, and how to improve recovery success across real world environments.
The session brings together N-able experts who address common backup and recovery challenges, walk through recent product updates, and share practical automation and scripting examples. Attendees can ask questions, provide feedback, and gain insight into upcoming roadmap plans, all with the goal of strengthening data resilience and reducing recovery risk.
1 week from now
Modern enterprises are rethinking how mobile devices are secured and managed as they become the most widely used endpoint in the organization. This webinar focuses on the shift from traditional mobile management toward zero touch workflows and Zero Trust security, addressing the challenges created by mixed ownership models, limited visibility and evolving threats. The session explains why mobile requires a dedicated security approach and how modern workflows can reduce complexity while improving protection.
The discussion covers practical ways to support BYOD, shared and one to one device models while maintaining continuous security and compliance. Attendees will see real workflow examples, including zero touch setup, return to service scenarios and security event handling, along with insights into balancing user experience and Zero Trust requirements. The webinar is designed for teams looking to modernize their mobile strategy at scale.
1 week from now
AI’s role in cybersecurity is often overstated in headlines, but this session focuses on what the technology is actually delivering in real defensive environments. The discussion breaks down which capabilities are real today, how AI strengthens detection and response and why it is becoming a practical tool for organizations facing modern threats. Attendees will see how AI supports human analysts by improving speed, accuracy and decision making across core security workflows.
The webinar also outlines straightforward ways to adopt AI driven tools and incorporate them into existing defenses without adding complexity. The speaker shares insight into the next stage of AI enabled security and what teams can expect as threat actors and defenders continue to evolve. Participants will leave with a clearer understanding of AI’s true value and actionable guidance they can apply immediately.
2 weeks from now
Security teams are seeing firsthand why manual security operations can no longer keep pace with today’s attack landscape. This webinar focuses on the key lessons from 2025 that revealed how rising vulnerability volumes, faster attacks, and limited resources are overwhelming traditional workflows. The session explains why organizations that depended on manual processes struggled to respond effectively, while those that adopted automation were able to reduce risk and improve response times.
The discussion highlights where manual security processes commonly fail and how automation improves scanning, normalization, detection, remediation, and compliance. Attendees will gain insight into the security challenges that defined 2025, why automation is essential for consistent and timely response, and which areas deliver the most measurable impact. The webinar also outlines practical ways to introduce automation without increasing operational complexity.