Hi [[ session.user.profile.firstName ]]

NSFOCUS

  • Date
  • Rating
  • Views
  • Service Provider Playbook- Building a Case for Managed DDoS Services
    Service Provider Playbook- Building a Case for Managed DDoS Services Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Recorded: Apr 26 2017 50 mins
    There is no doubt that DDoS attack activity is at an all-time high as attacks continue to plague the Internet; causing outages and impacting organizations on a scale never seen before. Regardless of the intent, the likelihood of larger and more frequent DDoS attacks is forcing service providers to plan for the inevitable. Most don’t realize there is a tremendous opportunity for service providers to protect their customers, and significantly profit from this activity. Delivering Managed DDoS Services can be very profitable due to the intensification of DDoS attacks, and the rising demand for protection.

    In this webinar, you’ll learn:

    •The Best Way to Defeat DDoS Attacks Targeting Your Customers and Your Infrastructure
    •How to Build an Internal Case for Your Organization to Offer Managed DDoS Services
    •About the Complete Service Provider DDoS Mitigation Solution
  • The Rise of IoT Botnets and How to Defend Against Them
    The Rise of IoT Botnets and How to Defend Against Them Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Recorded: Mar 29 2017 53 mins
    Nobody thought it was possible to spawn a 1Tbps+ DDoS attack by hijacking connected devices. Connected Internet of Things (IoT) devices are smart, convenient and notoriously lacking in security. IoT devices can be easily exploited due to their inherent security gaps. Soon these IoT-based attacks will become everyday occurrences for service providers and enterprises the like.

    Join Stephen Gates, Chief Research Intelligence Analyst at NSFOCUS, and learn about IoT-based botnets, how to detect them and how to better protect your connected devices.

    Viewers will learn about:
    - An exclusive overview of the Mirai malware and how it’s being used against your organization
    - The latest tactics, techniques, and procedures hackers are using in the escalation of IoT-based botnets
    - How to detect and defeat these attacks via cloud and on-premises defenses
  • NSFOCUS Hybrid DDoS Defenses
    NSFOCUS Hybrid DDoS Defenses NSFOCUS Recorded: Feb 27 2017 3 mins
    This video highlights our unique Intelligent Hybrid approach to DDoS defenses and showcases NSFOCUS awards and industry recognition
  • ISMG London Summit Interview - DDoS and Extortion: The Evolution
    ISMG London Summit Interview - DDoS and Extortion: The Evolution Richard Meeus, VP of Technology EMEA, NSFOCUS Recorded: Feb 8 2017 8 mins
    Richard Meeus, VP of Technology EMEA, NSFOCUS, on Responding to More Powerful Strikes.

    During the interview, Richard discussed,

    Characteristics of today's strongest DDoS and extortion attacks;
    The value of an intelligent hybrid security approach;
    How NSFOCUS is helping global customers defend against DDoS and extortion attacks.

    For more information, please visit our website, www.nsfocus.com
  • Defending the G20 Summit from Massive Cyber Attacks
    Defending the G20 Summit from Massive Cyber Attacks Anil Nandigam, Sr. Director, Product Marketing Recorded: Jan 31 2017 48 mins
    Today’s advanced cyber threats are borderless – and so are enterprises. As enterprises are increasingly adopting cloud, the siloed defense-in-depth technologies have proven futile against today’s advanced threats and borderless trends. This webinar will address the current security strategy shortfalls and the technology that can help better protect your organization.

    Join this presentation to learn:
    - Trends forcing organizations to reconsider their cybersecurity strategies
    - Why it’s important to have global threat intelligence to effectively combat advanced cyber threats
    - What Intelligent Hybrid Security is and how it can improve your security posture
    - How NSFOCUS protected the G20 Summit 2016 using this approach
  • The Year of Cyber Extortion--Why Now and What's Next?
    The Year of Cyber Extortion--Why Now and What's Next? Stephen Gates, Chief Research Intelligence Analyst Recorded: Dec 6 2016 58 mins
    Cyber extortion can take many forms. From ransomware and sextortion, to DDoS shakedowns, and data-dump blackmail, organizations all over the globe have been directly impacted by these campaigns in 2016. What’s changed with hackers’ tactics, techniques, and procedures, and why the sudden surge of activity this past year? What can we expect to see in 2017?

    Join Stephen as he exposes the reasons why this attack vector has drawn so much attention, and how it’s gained so much success. Since the primary enabler for extortion is fear, Richard will demonstrate how organizations can measure their exposure, plan for what’s coming, and take proactive steps to eliminate their fears. If the countermeasures are done right, these blackmail attempts will soon fall on deaf ears.
  • SANS Briefing: Adventures in Threat Intelligence
    SANS Briefing: Adventures in Threat Intelligence Guy Rosefelt Recorded: Nov 15 2016 43 mins
    After the Brexit of TI earlier this year, panic has subsided and cooler heads prevail. Now that we all agree Threat Intelligence can be a useful tool, you too can learn how to use TI like a pro. NSFOCUS shares real-world customer case studies and research to help their clients ensure a safer, more secure enterprise.
  • SANS Financial Services Security Vendor Briefing
    SANS Financial Services Security Vendor Briefing Steve Gates Recorded: Nov 15 2016 35 mins
    Financial institutions continue to be the target of the most advanced attacks by motivated threat actors. Unfriendly nation-states breach systems to seek intelligence or intellectual property. Hacktivists aim to make political statements through systems disruptions, while organized crime groups, cyber gangs, and other criminals breach systems for monetary gain.

    Join the SANS Institute as we bring the SANS Financial Services Security vendor briefing to the Financial Community in the New York City area. This 1/2 day event provides a unique opportunity to engage in dialogue around cybersecurity issues specific to the Finance Industry, and learn about key solution capabilities/customer success stories.

    Through the latest research efforts, in-depth technical knowledge and vendor solutions, attendees will walk away with strategic and tactical actions aimed to address key concerns for the Financial Industry such as:
    How can financial organizations manage these threats while maturing their prevention, detection and reaction capabilities?
    How can they operationalize threat intelligence in the most effective way?
    What are the strategies needed to elevate their cyber resilience while ensuring they keeping pace with regulatory requirements?
  • Understanding the Threat Intelligence Ecosystem
    Understanding the Threat Intelligence Ecosystem Stephen Gates Recorded: Nov 10 2016 14 mins
    Everybody talks about threat intelligence today, but how well are they distinguishing raw data from actionable intelligence? Stephen Gates of NSFOCUS discusses cybersecurity and the new threat intelligence ecosystem.

    "The operative word is 'actionable,'" says Gates, Chief Research Intelligence Analyst at NSFOCUS. Threat intelligence means a lot of things to a lot of people, he adds. But what it comes down to is: "Do you want to gain further insight into the threat landscape that your organization faces on a daily basis? That's what threat intel is all about - gaining that insight with actionable intelligence and understanding the threats [you're] under."

    In an interview about the threat intelligence ecosystem, Gates discusses:

    How many organizations fail to distinguish actionable TI;
    Why the ecosystem is so critical to cybersecurity;
    How NSFOCUS distinguishes itself in a crowded marketplace.
  • Threat Intelligence: What It Is, and How to Use It Effectively
    Threat Intelligence: What It Is, and How to Use It Effectively Matt Bromiley and Stephen Gates Recorded: Nov 3 2016 61 mins
    Security practitioners are hearing more and more about threat intelligence (TI). But what exactly is it, and how can TI be effectively deployed as part of an organization's defenses against advanced malware and cyberattacks?

    In this webcast, you will learn just what constitutes threat intelligence, the different kinds of TI and why companies are implementing it. Attendees will also learn how and when to integrate intelligence into their security posture, the role of this intelligence in incident response and when to use it to identify critical security events.

    Join us to get a clearer understanding of this powerful tool and to learn how you can make the best use of it

Embed in website or blog