Hi [[ session.user.profile.firstName ]]

Area 1 Security

  • Date
  • Rating
  • Views
  • Area 1 Security Phish of the Week
    Area 1 Security Phish of the Week
    Kel Jackson Recorded: Oct 11 2018 12 mins
    Area 1 Security dives deep into an interesting phish and how they caught it. This week on Oct 11 2018, Sr. PM Kel Jackson takes a look at a compromised address phish.
  • Security Awareness Training: Can Your People be Patched ?
    Security Awareness Training: Can Your People be Patched ?
    Jane Wasson, Area 1 Product Marketing Recorded: Sep 24 2018 10 mins
    Security awareness training is deployed by many organizations today for a variety of reasons including meeting regulatory requirements and reducing the risk of phishing breaches.

    But unfortunately, security awareness training alone doesn’t stop phishing.

    During today’s webinar, we’ll look at the role security awareness training plays in protecting from phishing and why analysts recommend that for best protection, organizations should combine anti-phishing technical controls and security training to defend from phishing attacks.
  • SIEM Security: Accelerate Phishing Detection and Incident Response
    SIEM Security: Accelerate Phishing Detection and Incident Response
    Jane Wasson Area 1 Product Marketing Recorded: Aug 16 2018 11 mins
    The threat that most often breaches defenses is the phishing attack. One of the biggest challenges for security teams and is to quickly and effectively detect these attacks, and then efficiently investigate and respond to prevent damage.

    Watch this webinar and learn how customers that integrate Area 1’s pre-emptive anti-phishing service with a SIEM platform can:

    o Get deep insight and visibility into phish detected and blocked by the
    Area 1 service
    o Quickly and effectively uncover related advanced threat activity
    organization-wide
    o More efficiently investigate and respond to incidents
    o Provide visibility into threat actor behavior and trends
    o Facilitate and customize threat reporting
  • Phishing Attack Vectors | How to Fortify Your Defenses
    Phishing Attack Vectors | How to Fortify Your Defenses
    Jane Wasson | Product Marketing Manager | Area 1 Security Recorded: Jun 18 2018 12 mins
    If all of the email systems in the world shut down tomorrow, would phishing attacks stop?

    Nope.

    Why? The attack vectors hackers use to execute phishing campaigns aren’t limited to only email traffic. So defense strategies that focus on protecting just email will miss phishing activity on other attack vectors. For best protection, your security strategy needs a unified approach to protect you from phishing activity across all common attack vectors, including email, web, and network.

    Join this webinar and learn:

    o Attack vectors hackers exploit to execute phishing campaigns

    o How phish bypass security infrastructure

    o Strategies to fortify defenses and stop phishing attacks
  • The Eight  Ways Phishing Attacks Bypass Sandbox Technology
    The Eight Ways Phishing Attacks Bypass Sandbox Technology
    Jane Wasson Recorded: May 4 2018 15 mins
    Sandbox technology is a favorite tool for security researchers, enabling them to analyze files and detect malware.

    But is it effective at actually stopping phishing attacks without slowing down business productivity?

    Watch this webinar to learn:

    o How Sandboxes Detect Malware Phish
    o Techniques Hackers Use to Evade Sandboxes
    o A Better Way To Defeat Phish
  • Why Email Authentication Can't Stop Phish
    Why Email Authentication Can't Stop Phish
    Jane Wasson, Area 1 Security Product Marketing Recorded: Apr 9 2018 15 mins
    What can be done to better protect organizations and individuals from phishing attacks that start with fake email?

    The unfortunate truth is that email technology was not initially designed to be secure. Hackers use many techniques to send imposter email and trick end users. In response, email security technology has evolved over the years to add sender authentication features meant to protect recipients from fake email. While this helps, it’s clear from the headlines that fake email continues to bypass email authentication defenses and in fact, the entire security infrastructure.

    Learn more about email authentication and how to effectively shut down fake email phish, including:

    Techniques Hackers Use to Spoof Email

    The Role of Email Authentication

    How to Fortify Your Security Infrastructure to Stop Phish

    How customers in case studies stopped fake emails
  • Why Secure Email Gateways Miss Phishing Emails
    Why Secure Email Gateways Miss Phishing Emails
    Jane Wasson Recorded: Feb 26 2018 13 mins
    Email remains the number one threat vector for data breaches. Secure email gateways (SEGs), the very resource we depend on to protect our email, actually miss phishing attacks with regularity. Why? Watch this webinar and learn exactly how phish evade them. Ideally, SEGs detect emails sent from malicious sites, prevent users from accessing deceptive URLs, pinpoint attachments with criminal code, and sandbox suspicious files. So with all this smart technology on alert—why do targeted phishing attacks slip through?

    Join this webinar to learn:

    Why phishing attacks evade secure email gateways

    The breakthrough that fortifies defenses and stops targeted phishing attacks

    Demonstrated effectiveness of preemptive phish-detection from Fortune 1000 businesses
  • To Catch a Phish: Detection Innovations
    To Catch a Phish: Detection Innovations
    Vivek Bhandari, Director of Product Management, Area 1 Security Recorded: Jan 29 2018 14 mins
    There are new phishing campaigns being created all the time by threat actors. Area 1 proactively identifies and stops phishing attacks across all traffic vectors. This short webinar covers some of the more recent detections that have stopped several phishing campaigns for our customers. We will cover instant link analysis for emails, encrypted attachment analysis and exploit kit tracking.
  • Stopping Business Email Compromise (BEC)
    Stopping Business Email Compromise (BEC)
    Vivek Bhandari, Director of Product Management, Area 1 Security Recorded: Sep 18 2017 15 mins
    BEC emails are the top concern for most big companies. These phishing emails operate without links and attachments, two of the flags which can mark malicious messages. They also work off the power structures in a company, using the names of key players, customers, and even board members to trick employees into doing things like transferring money. Learn how these attacks work and how Area 1 Security stops them.
  • Inside a Carbanak Phishing Attack
    Inside a Carbanak Phishing Attack
    Mike Zeberlein, Director of Threat Intelligence. Zeberlein has over 20 years supporting military and intelligence communities Recorded: Jul 20 2017 39 mins
    The sophisticated Eastern European cybercrime group implicated in the Chipotle hack is known for its financial targets. Learn how Carbanak launches a phishing campaign, from Michael Zeberlein, an expert in cyber-counterintelligence, advanced adversary hunting, malware analysis and digital forensics.
    The talk will go over:
    —The verticals being targeted
    —Payloads and planning
    —Specific campaigns and victims

Embed in website or blog