Hi [[ session.user.profile.firstName ]]

NSFOCUS

  • Date
  • Rating
  • Views
  • Protect and Consolidate Your Cyber Business from DDoS Attacks
    Protect and Consolidate Your Cyber Business from DDoS Attacks Bruno Carvalho, Solution Architect, EMEA Recorded: Sep 11 2018 49 mins
    As attacks targeting web applications are becoming more frequent, it’s more important than ever for organizations to understand how to protect against attackers targeting all levels of the infrastructure. Attackers are using technologies, tools, and reconnaissance to scout where you are most susceptible to assault. Although you are susceptible to attack, you don’t have to be vulnerable.

    By adopting a two-solution DDoS mitigation strategy – employing one mitigation downstream to defend at the point of attack and the other upstream to provide protection closer to the attacker before it reaches your network – organizations have the best path to resiliency and operational efficiency in the event of a DDoS attack.

    Additional considerations
    •How are you defining detection?
    •If you’re using a DDoS mitigation company, what’s the time to mitigate?
    •Do you have cloud solution as failover option?
    •Are you doing all that you can to protect your organization against the next attack?
    •NSFOCUS Holistic Hybrid Security Solutions
    •NSFOCUS Threat Intelligence

    Reserve your seat today to understand how Protect and Consolidate Your Cyber Business from DDoS Attacks
  • 3 Lessons to Learn from Drupalgeddon 2
    3 Lessons to Learn from Drupalgeddon 2 Guy Rosefelt, Director of PM at NSFOCUS and Michelangelo Sidagni CoFounder and CTO at NopSec Recorded: Jul 20 2018 33 mins
    • An in-depth analysis of the Drupal vulnerabilities: CVE-2018-7600 & CVE-2018-7602
    • NSFocus & NopSec's research findings about the Drupal Vulnerabilities
    • Common themes with php vulnerabilities & how to protect your organization from them
  • What and Where Were the Top IoT Cyber-Threats in 2017?
    What and Where Were the Top IoT Cyber-Threats in 2017? Xiaobing Sun, Principal Security Researcher Recorded: Jun 26 2018 52 mins
    In the past few years, with the proliferation of IoT devices, IoT security becomes a hot topic. Earlier this year, researchers at NSFocus put together a “2017 Annual IoT Cybersecurity Report”, surveying the IoT landscape and the new threats from them. In this webinar, we will highlight the important findings and opinions in this report. Topics include:
    •Survey of the exposed IoT devices.
    •Various vulnerabilities in these IoT devices.
    •Threat analysis from these IoT devices.
    •How to protect the IoT devices.
  • FinTech Security: Cyberthreats Today and Tomorrow
    FinTech Security: Cyberthreats Today and Tomorrow Guy Rosefelt, Director of PM Recorded: May 29 2018 41 mins
    This is an opportunity for all Fintech security professionals to take a deep dive into the current and future threats targeting the technology that drives the financial sector.
    This briefing will present highlights of the joint NSFOCUS and Ping An Financial Security Research Institute authored report “2017 Fintech Security Analysis Report”. Topics include:

    •An analysis of Fintech from the perspective of the Internet
    •The development history of and current trends in Fintech
    •Typical Fintech cybersecurity threats, data security threats, and business security threats
    •The current security posture of Fintech institutions and the security trends that they should be aware of.

    Reserve your seat today to learn how to better arm yourself against the next generation of threats against Fintech.
  • Adventures in TI: What is your IP Reputation?
    Adventures in TI: What is your IP Reputation? Guy Rosefelt, Director of PM, APAC Threat Intelligence & Web Security Recorded: Oct 17 2017 48 mins
    Abstract: Can you afford not knowing how bad your provider's IP reputation is? How likely are IP addresses adjacent to you of being infected with malware or participating in botnets?

    NSFOCUS has been tracking the reputation of IP addresses globally by ASN for over a year and recently released the August 2017 Global IP Reputation report. Some interesting patterns have emerged worldwide as the number of IP addresses added to reputation lists continues to increase due to Mirai, WannaCry and other malware infecting the Internet of Things.

    NSFOCUS SecLab is tracking IP reputation across 9 categories, including SPAM, DDoS, botnets, and web attackers. This talk will present global IP reputation trends and rank the countries with the worst IP reputation…and it may not be China.
  • Emerging DDoS Trends 2017: Empty Threats & Real Attacks
    Emerging DDoS Trends 2017: Empty Threats & Real Attacks Xiaobing Sun, Principal Security Researcher Recorded: Oct 10 2017 37 mins
    This year the cyber-security realm has experienced a few dramatic emerging trends to include a couple of the largest denial-of-service attacks and ransomware outbreaks in history. Follow NSFOCUS as we take a deeper look into these DDoS attacks and some of the processes that now seem to be tied to the overall attack-chain. Additionally, we will learn how protective measures such as Threat Intelligence and cloud-based DDoS defenses are adding value to circumvent and mitigate attack efforts from various threat actors.
  • NSA Hacking Tools Exposed Pt 2: Are You Protected?
    NSA Hacking Tools Exposed Pt 2: Are You Protected? Cody Mercer, Senior Threat Research Analyst Recorded: May 24 2017 31 mins
    The ‘Shadow Brokers’ have recently released a new cache of malware exploits into the wild in which our NSF Threat Intelligence Researchers were able to reverse engineer and ‘sandbox’ for analytical purposes. With this noted, very sophisticated malware strains developed at the ‘State-Sponsored’ level by such entities as NSA are now readily available and primarily targeting vulnerabilities identified in Microsoft OS’s and MS applications.

    This will be the second installment to my previous BrightTalk presentation that will take a deeper look into specific exploits released by the Shadow Brokers and their attributed TTP’s (Techniques, Tactics, Procedures) and how NSFOCUS’s Threat Intelligence can assist in securing your security posture.

    Join NSFOCUS in this event to discuss:

    •What are the exploits Fuzzbunch, Dandersprit, and OddJob and their associated campaigns?

    •How can NSF’s Threat Intelligence Portal and Reputation Feeds protect you and your company against these recently released malwares?

    •Gain a better understanding of TI components to include ‘Strategic’ and ‘Tactical’ information and how knowledge of these exploits will help protect your company from future compromise.
  • Service Provider Playbook- Building a Case for Managed DDoS Services
    Service Provider Playbook- Building a Case for Managed DDoS Services Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Recorded: Apr 26 2017 50 mins
    There is no doubt that DDoS attack activity is at an all-time high as attacks continue to plague the Internet; causing outages and impacting organizations on a scale never seen before. Regardless of the intent, the likelihood of larger and more frequent DDoS attacks is forcing service providers to plan for the inevitable. Most don’t realize there is a tremendous opportunity for service providers to protect their customers, and significantly profit from this activity. Delivering Managed DDoS Services can be very profitable due to the intensification of DDoS attacks, and the rising demand for protection.

    In this webinar, you’ll learn:

    •The Best Way to Defeat DDoS Attacks Targeting Your Customers and Your Infrastructure
    •How to Build an Internal Case for Your Organization to Offer Managed DDoS Services
    •About the Complete Service Provider DDoS Mitigation Solution
  • The Rise of IoT Botnets and How to Defend Against Them
    The Rise of IoT Botnets and How to Defend Against Them Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Recorded: Mar 29 2017 53 mins
    Nobody thought it was possible to spawn a 1Tbps+ DDoS attack by hijacking connected devices. Connected Internet of Things (IoT) devices are smart, convenient and notoriously lacking in security. IoT devices can be easily exploited due to their inherent security gaps. Soon these IoT-based attacks will become everyday occurrences for service providers and enterprises the like.

    Join Stephen Gates, Chief Research Intelligence Analyst at NSFOCUS, and learn about IoT-based botnets, how to detect them and how to better protect your connected devices.

    Viewers will learn about:
    - An exclusive overview of the Mirai malware and how it’s being used against your organization
    - The latest tactics, techniques, and procedures hackers are using in the escalation of IoT-based botnets
    - How to detect and defeat these attacks via cloud and on-premises defenses
  • NSFOCUS Hybrid DDoS Defenses
    NSFOCUS Hybrid DDoS Defenses NSFOCUS Recorded: Feb 27 2017 3 mins
    This video highlights our unique Intelligent Hybrid approach to DDoS defenses and showcases NSFOCUS awards and industry recognition

Embed in website or blog