Hi [[ session.user.profile.firstName ]]

Nyotron

  • Date
  • Rating
  • Views
  • Should More Protection Really Equal More False Positives?
    Should More Protection Really Equal More False Positives? Nir Gaist, Founder & CTO, Nyotron Recorded: Aug 15 2018 30 mins
    Security professionals accept the paradigm of “more protection equals more false positives (FPs)” as a fact of life. The tighter they make the “screws” of the security policies in their DLP, Web or Email Gateways, UEBA, application control/whitelisting and AV tools, the higher the likelihood something benign is misclassified as malicious. That’s why it is not uncommon to see false positive rates exceed 5% using the most aggressive settings.

    What if we were thinking about this wrong? Can we break this correlation between more security and more FPs?

    During this webinar we will briefly review the definition of false positives, false negatives, true positives and true negatives, as well as the history of “more protection = more FPs” paradigm. Then we will turn the paradigm on its head and discuss how more protection can actually mean fewer FPs.


    About the Speaker
    Nir Gaist, Founder and CTO of Nyotron, is a recognized information security expert and ethical hacker. He started programming at age 6 and began his studies at the Israeli Technion University at age 10. Nir has worked with some of the largest Israeli organizations, such as the Israeli Police, the Israeli parliament and Microsoft’s Israeli headquarters. He also wrote cybersecurity curriculum for the Israel Ministry of Education. Nir holds patents for the creation of a programming language called Behavior Pattern Mapping (BPM) that enables monitoring of the integrity of the operating system behavior to deliver threat-agnostic protection.
  • What Can You Do When You Can’t Stop Malware?
    What Can You Do When You Can’t Stop Malware? Teresa Wingfield, Director of Product Marketing and Robert Zamani, Director, Solution Architects Recorded: Jun 28 2018 31 mins
    Malware detection and prevention solutions are necessary in any organization. But, antivirus and even next-generation antivirus solutions can miss unknown threats, giving malicious software free reign to your systems and data. During this presentation, Nyotron’s Director of Product Marketing, Teresa Wingfield and Director, Solution Architects, Robert Zamani, will discuss why endpoint protection solutions relying on signatures, machine learning models and threat hunting can’t always cope with a never ending number of new attack methods and malware variants.

    While you won’t be able to stop all malware using endpoint security, you can stop the damage it intends to cause. Join us to learn how.
  • Will Windows 10’s Controlled Folder Access Protect Your Data from Ransomware?
    Will Windows 10’s Controlled Folder Access Protect Your Data from Ransomware? Nyotron’s Vera Drobov, Security Researcher, & Rene Kolga, Sr. Director, Product Management Recorded: May 22 2018 29 mins
    With the release of Windows 10 Fall Creators Update, Microsoft added a new feature called Controlled Folder Access (CFA) to Windows Defender Exploit Guard. This features allows users and organizations to control which processes can access certain folders in an attempt to help protect data from malicious programs, such as ransomware or wipers.

    But, will CFA really keep your data safe? Vera Drobov of Nyotron’s Security Research Team and Rene Kolga, Senior Director of Product Management at Nyotron will discuss why this isn’t likely due to vulnerabilities in the CFA feature. Our team has discovered at least five different ways of exploiting and bypassing CFA, including:

    - APC Injection
    - Windows Management Instrumentation (WMI)
    - Office Macros

    During this interactive webinar, you will see multiple exploits in action.
  • Endpoint Security: The Right Balance Between Positive and Negative Approaches
    Endpoint Security: The Right Balance Between Positive and Negative Approaches Forrester Senior Analyst Chris Sherman and Nyotron's Senior Director of Product Management Rene Kolga Recorded: Apr 26 2018 58 mins
    Endpoint security represents the frontline in your fight against cybercriminals. Despite the relative maturity of the endpoint security market, new threats and evolving attacker capabilities have proven traditional approaches inadequate - and left organizations exposed.

    Guest speaker Forrester Senior Analyst Chris Sherman and Nyotron's Senior Director of Product Management Rene Kolga will discuss the current state of endpoint security while highlighting a path forward for organizations looking to re-focus their strategies to combat current threats.

    Attendees will learn:

    • Which threats are causing the most difficulties for traditional
    endpoint security approaches
    • Why organizations need to balance positive and negative security
    approaches
    •How to layer multiple tools for maximum protection
  • Iranian-Backed OilRig Group Returns with Next-Generation Malware
    Iranian-Backed OilRig Group Returns with Next-Generation Malware Rene Kolga, Senior Director of Product Management at Nyotron and Robert Zamani, Director of Solutions Architect at Nyotron Recorded: Mar 29 2018 43 mins
    Nyotron’s research team began tracking new active OilRig attacks on a number of organizations across the Middle East in November 2017. Our security team has discovered that the Iran-linked OilRig group has significantly evolved its tactics, techniques and procedures (TTPs), introduced next-generation malware tools and new data exfiltration methods since previous attacks.

    Among key advancements, the new variant of OilRig introduces a variety of new command and control (C&C) and data exfiltration capabilities using Google Drive, SmartFile, a file sharing and transfer solution, and an ISAPI filter to extend the functionality of Microsoft Internet Information Services (IIS) servers.

    During this webinar, Nyotron will provide technical details of the attacks along with the TTPs used and the timelines to help security professionals deal with this threat actor in the future.
  • Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware
    Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware Shahid N. Shah, Cybersecurity and risk management expert, and Rene Kolga, Senior Director of Product Management at Nyotron Recorded: Feb 27 2018 54 mins
    Machine Learning (ML) has become the shiny new object for security and is the foundational pillar of products such as Next-Generation Antivirus (NGAV) and User and Entity Behavior Analytics (UEBA). While most of these products have promised to be a “silver bullet” against malware, complete protection remains elusive. In fact, ML is more likely to detect and cure cancer than to stop all of today’s advanced threats for a number of reasons:

    • The past doesn’t predict the future
    • Nothing will keep the bad guys out
    • The harder you try the more you fail
    • You can’t always be connected
    • It’s a black box

    Shahid N. Shah, an internationally recognized cybersecurity and risk management expert, and Rene Kolga, Senior Director of Product Management at Nyotron, will explain these shortcomings and how to avoid them. Instead of chasing after an infinite number of malware variants and attack vectors, a different approach to malware detection is to focus on the finite intentions behind attacks, such as data exfiltration, corruption and deletion.
  • Are You Too Negative When It Comes to Your Endpoint Security Strategy?
    Are You Too Negative When It Comes to Your Endpoint Security Strategy? Lenny Liebmann, Founding partner at Morgan Armstrong, Nir Gaist, Founder and CTO at Nyotron Recorded: Jan 16 2018 46 mins
    Like most organizations, you’ve probably deployed endpoint security. Still, you can’t seem to stop all existing and new threats, particularly fileless malware. You’re being infected, getting ransomware and/or having unwanted downtime.

    This presentation will include a dynamic discussion between Lenny Liebmann, founding partner at Morgan Armstrong and Nir Gaist, founder and CTO at Nyotron on why the Negative Security model that tries to track down everything “bad” will eventually miss some elusive new threat.

    Although a multi-layered security strategy that includes a Positive Security model provides better and more continuous protection for endpoints, this model has historically been difficult since it involves complex and time consuming whitelist maintenance. Lenny and Nir will describe a new OS-Centric Positive Security model that is a game changing innovation for simpler and more effective endpoint security.

Embed in website or blog