Hi [[ session.user.profile.firstName ]]

Cyphort

  • Date
  • Rating
  • Views
  • Building Toward Adaptive Response Building Toward Adaptive Response Franklyn Jones, VP of Marketing, Cyphort, Jeff Pollard, Principal Analyst, Forrester Recorded: Oct 24 2016 37 mins
    Security leaders understand that there's no catching up to the volume of attacks that threat actors can throw at them. They also know they can't solve problems with technology alone. In 2016 and onward they look to blend technology, people, and process together and create an Adaptive Response framework that allows them to integrate detect, protect, and respond so that each one augments the other. Join us for a webinar with guest Forrester Principal Analyst, Jeff Pollard, as we discuss the current barriers that exist before an organization can build Adaptive Response capabilities. Cyphort will discuss and demonstrate how their technology helps transforms enterprises by becoming an adaptive response fabric that enhances workflows across the domains of detect, protect, and respond.
  • Why is the Industry Still Failing to Stop Cyber Attacks? Why is the Industry Still Failing to Stop Cyber Attacks? Larry Ponemon (Ponemon Institute), Franklyn Jones (Cyphort) Recorded: Oct 12 2016 41 mins
    According to 2016 research from the Ponemon Institute, companies are spending an average of $16M annually on cyber security tools and technologies, and yet they still struggle to detect and block advanced threats intent on doing damage to their organizations. Too many alerts, too many false positives, and too many days go by before a threat is finally discovered inside the network.

    Join us as Larry Ponemon, Chairman and President of the Ponemon Institute, takes a closer look at key findings from research data collected from nearly 600 organizations. From there, Franklyn Jones, Vice President at Cyphort will show you how the company’s innovative Adaptive Detection Fabric can help you extract more value from your existing investments, and gain visibility and control over advanced targeted attacks before they can do damage to your business.
  • Ransomware Resurgence: Locky and Other “New Cryptolockers” Ransomware Resurgence: Locky and Other “New Cryptolockers” Nick Bilogorskiy, Sr. Director, Threat Operations, Cyphort Recorded: Aug 25 2016 39 mins
    Like many viruses, botnets and malware families that we’ve seen over the past decade, hackers continue to find new ways of reinventing old threats. And this is no different for Ransomware.

    Ransomware has come a long way from non-encrypting lockscreen FBI scare warnings like Reveton. In 2016 alone, there have been new ransomware families popping up and we expect that to only pick up steam over the summer.

    In this edition of MMW, Nick Bilogorskiy, Senior Director of Threat Operations at Cyphort, will discuss:

    Locky, the new “it” ransomware and how it works

    A deep dive into a new family of ransom locker discovered by Cyphort Labs in March, that uses TOR Hidden Service

    Other new ransomware families and why it’s becoming the preferred monetization method for attack
  • MMW: Understanding Malware Lateral Spread Used in High Value Attacks MMW: Understanding Malware Lateral Spread Used in High Value Attacks Nick Bilogorskiy, Sr. Director, Threat Operations, Cyphort Recorded: Jul 14 2016 34 mins
    Understanding Malware Lateral Spread Used in High Value Attacks

    APTs are known to use advanced Techniques, Tactics, and Procedures (TTP), including advanced malware design with protection layers, sandboxing evasion, and lateral movement inside penetrated networks to seek out high value targets.

    In this webinar, Nick Bilogorskiy of Cyphort Labs will:

    Review various lateral movement techniques and methods used by past advanced threats
    Look at some APT samples like Shamoon, in detail to show the specific steps in the lateral movement by the malware
    Provide an understanding of how lateral movement of APT should help security defenders to better select and implement protection solutions