Hi [[ session.user.profile.firstName ]]

NSFOCUS

  • Date
  • Rating
  • Views
  • Botnets-They Keep Going...and Going....
    Botnets-They Keep Going...and Going....
    Guy Rosefelt, Director of PM at NSFOCUS Recorded: Jun 25 2019 59 mins
    Botnets, one of the oldest threats on the internet, are still the most popular weapon in a hacker’s arsenal. They offer ease of use, flexibility, and high availability, traits ideal for launching large-scale lethal cyber-attacks around the world. This webinar will present highlights from the NSFOCUS 2018 Botnet Trend report including an overview of botnet activity and insight into the four most prominent botnet families active today. The attendee should be able to better identify botnet activity based on the recommendations provided.
  • The DDoS Attacks Go Up and Down
    The DDoS Attacks Go Up and Down
    Guy Rosefelt, Director of PM at NSFOCUS Recorded: Apr 18 2019 48 mins
    NSFOCUS Security Labs research has seen a dramatic decrease in DDoS attacks between 2017 and 2018. We are in consensus with other TI vendors as to most of the driving factors behind this large scale reduction, except one. This webinar will show why NSFOCUS is breaking from the pack on one of the key factors leading to the significant decrease in DDoS attacks in 2018.
  • Blockchain and AI the Next Gen Battlefield for Cyber
    Blockchain and AI the Next Gen Battlefield for Cyber
    Guy Rosefelt of NSFOCUS, Mayande Walker of OpenCryptoTrust (OpenCT) and Dominic Steil of Dapps Inc. Recorded: Apr 12 2019 32 mins
    JSA TV is proud to share the April installment of its 2019 Virtual CEO Roundtable series, "Blockchain & AI: The Next Gen Battleground for Cybersecurity". The roundtable is moderated by Gerry Christensen of Mind Commerce, and panelists include top industry executives, Guy Rosefelt of NSFOCUS, Mayande Walker of OpenCryptoTrust (OpenCT) and Dominic Steil of Dapps Inc.

    With the onslaught of IoT and the growing reliance on AI-driven processes, networks and machines, cybersecurity is a critical concern. Enter blockchain, a distributed ledger that allows for public, decentralized transactions without the need for third-party intervention. Since the interaction is public, blockchain technology is often described not just as ‘reliable’, but also as ‘incorruptible infrastructure’. Is blockchain the next battleground arena for preventing cyberattacks?

    Watch the roundtable to learn what the latest developments and deployment timelines are and what we can expect in the year ahead in network security, blockchain and AI developments.
  • Do you Know the Risks Contained in Your Container?
    Do you Know the Risks Contained in Your Container?
    Xiaobing Sun, Principal Security Researcher at NSFOCUS and Glen Kosaka, VP of Product Management at NeuVector Recorded: Feb 27 2019 60 mins
    Over the last few years, container technology has grown rapidly among many enterprises from large to small. According to the RightScale 2018 State of the Cloud Report, over 50% of the enterprises has now adopted some kinds of container technologies. As with any other new technologies, containers have brought new security risks into those organizations’ infrastructure. What are these new risks, and how to asses and mitigate them have become some of the important questions in many of CIO and CISO’s mind.

    Recently, NSFOCUS and NeuVector jointly published the “2018 NSFOCUS Technical Report of Container Security” to address these questions. In this webinar, we will discuss some of the highlights from this report, focusing on the new attack vectors introduced by the container technology and the general way to protect against them. We will also discuss how to build security into your pipeline and introduce NeuVector’s run-time contain security solution.
  • That's the Sound of DDoS Working from an IP Chain-Gang
    That's the Sound of DDoS Working from an IP Chain-Gang
    Guy Rosefelt, Director of PM at NSFOCUS Recorded: Feb 6 2019 42 mins
    NSFOCUS showed in our “2018 H1 Cybersecurity Insights” report that "Recidivists are responsible for 40% of the attacks we saw on the internet, most of which are botnet activities and DDoS attacks". Since botnet activities and DDoS attacks are usually launched from multiple sources in a collaborative way, it's not surprising to see that many of these recidivists are working together as a group in these attacks. We call these groups "IP Chain-Gangs" as most people had trouble pronouncing "recidivists”. Opening a new area of research, NSFOCUS recently published our “Behavior Analysis of IP Chain-Gangs” report documenting how, by using innovative techniques, we identify "IP Chain-Gangs" and study the behavior of the chain-gangs using DDoS attack data collected by NSFOCUS since 2017. In this webinar, we will provide insights into this intriguing new research, explaining how we identify IP Chain-Gangs, how we characterize IP Chain-Gang behavior, and how future research can be used to improve botnet and DDoS mitigation.
  • Low to High: Risk Adverse May Not Make the Most Risk Sense
    Low to High: Risk Adverse May Not Make the Most Risk Sense
    Guy Rosefelt, Director of PM at NSFOCUS and Adrian Sanabria, VP of Strategy and Product Marketing at NopSec Recorded: Nov 15 2018 59 mins
    Recent evidence shows that a surprisingly high portion of vulnerabilities incorporated into malware or exploit kits are ranked low or medium severity. Counter to commonly-accepted practices, focusing only on high-severity vulnerabilities and setting a ‘cut-off’ point for lower scored issues, is not a safe or effective strategy. More importantly, proof-of-concept (POC) code for lower priority vulnerabilities is appearing more quickly after 0-day announcement leading to leading to widespread attacks equally as quickly. NSFOCUS and Nopsec will delve into this recent trend, discuss some of these lower level vulnerabilities being quickly exploited, and provide some thoughts how to better protect against these in the future.
  • Worse than Pests: Cyber Attackers Keep Coming Back
    Worse than Pests: Cyber Attackers Keep Coming Back
    Guy Rosefelt, Director of PM at NSFOCUS Recorded: Oct 25 2018 54 mins
    According to observations from the NSFOCUS Threat Intelligence Center (NTI), nearly 20% of attack source IP addresses have initiated more than one type of attack. That and other attack type trends such as DDoS, malware and web intrusions are only on the rise. The NSFOCUS 2018 H1 Cybersecurity Insights Report shows how bad the threat landscape was for the first half of this year and predicts what it will be like for the remainder. This webinar shows the driving forces behind these trends and what you can do to prepare for them.
  • [SPANISH] Cómo proteger y consolidar su negocio cibernético de los ataques DDoS?
    [SPANISH] Cómo proteger y consolidar su negocio cibernético de los ataques DDoS?
    Bruno Carvalho, Arquitecto de soluciones, EMEA Recorded: Sep 20 2018 56 mins
    Dado que los ataques dirigidos a las aplicaciones web son cada vez más frecuentes, es más importante que nunca que las organizaciones comprendan cómo protegerse contra los atacantes que apuntan a todos los niveles de la infraestructura. Los malintencionados están utilizando tecnologías, herramientas y conocimiento para explorar dónde eres más susceptible al ataque. Aunque eres susceptible de atacar, no tienes que ser vulnerable.
    Si usted es como la mayoría de las organizaciones, ya tiene una solución DDoS implementada, pero eso podría no ser lo suficientemente bueno. Cada vez más, los expertos recomiendan alejarse de los puntos únicos de falla, duplícalos o a veces triplicar, las soluciones de mitigación DDoS.
    Al adoptar una estrategia de mitigación DDoS híbrida (capacidad local y nube), las organizaciones tienen la mejor ruta hacia la resiliencia y eficiencia operativa en el evento de un ataque DDoS.

    Consideraciones adicionales
    • ¿Cómo estás definiendo la mitigación?
    • Si está utilizando una compañía de mitigación DDoS, ¿cuál es el mejor momento de mitigar?
    • ¿Tiene solución de nube como opción de failover?
    • ¿Estás haciendo todo lo que puedes para proteger a tu organización contra el próximo ataque?
    • NSFOCUS Holistic Hybrid Security
    • NSFOCUS Threat Intelligence

    Reserve su asiento hoy mismo para comprender cómo proteger y consolidar su negocio cibernético frente a los ataques DDoS
  • Protect and Consolidate Your Cyber Business from DDoS Attacks
    Protect and Consolidate Your Cyber Business from DDoS Attacks
    Bruno Carvalho, Solution Architect, EMEA Recorded: Sep 11 2018 49 mins
    As attacks targeting web applications are becoming more frequent, it’s more important than ever for organizations to understand how to protect against attackers targeting all levels of the infrastructure. Attackers are using technologies, tools, and reconnaissance to scout where you are most susceptible to assault. Although you are susceptible to attack, you don’t have to be vulnerable.

    By adopting a two-solution DDoS mitigation strategy – employing one mitigation downstream to defend at the point of attack and the other upstream to provide protection closer to the attacker before it reaches your network – organizations have the best path to resiliency and operational efficiency in the event of a DDoS attack.

    Additional considerations
    •How are you defining detection?
    •If you’re using a DDoS mitigation company, what’s the time to mitigate?
    •Do you have cloud solution as failover option?
    •Are you doing all that you can to protect your organization against the next attack?
    •NSFOCUS Holistic Hybrid Security Solutions
    •NSFOCUS Threat Intelligence

    Reserve your seat today to understand how Protect and Consolidate Your Cyber Business from DDoS Attacks
  • 3 Lessons to Learn from Drupalgeddon 2
    3 Lessons to Learn from Drupalgeddon 2
    Guy Rosefelt, Director of PM at NSFOCUS and Michelangelo Sidagni CoFounder and CTO at NopSec Recorded: Jul 20 2018 33 mins
    • An in-depth analysis of the Drupal vulnerabilities: CVE-2018-7600 & CVE-2018-7602
    • NSFocus & NopSec's research findings about the Drupal Vulnerabilities
    • Common themes with php vulnerabilities & how to protect your organization from them

Embed in website or blog