Hi [[ session.user.profile.firstName ]]

Information Technology Security

  • Date
  • Rating
  • Views
  • Ransomware (R)evolution Ransomware (R)evolution Tyler Moffitt | Senior Threat Research Analyst Recorded: Sep 22 2016 49 mins
    Over the past few years, malware authors have developed increasingly sophisticated and creative ways to infect endpoints. Encrypting ransomware is no longer merely an annoyance. It's a highly persistent and organized criminal activity in full deployment, with Ransomware-as-a-Service at its core. The damage from becoming a ransomware victim is considerable, and can even put organizations out of business.

    At Webroot, we believe it's possible to effectively protect enterprises and users, but only by understanding your adversary and the techniques they use for their attacks. In this webinar, Webroot's own Senior Threat Research Analyst, Tyler Moffitt, will offer expert insights into the past, current, and emerging encrypting ransomware variants--and how businesses can stay ahead.
  • 2016 Webroot Quarterly Threat Update 2016 Webroot Quarterly Threat Update Tyler Moffitt | Security Threat Research Analyst Recorded: Aug 22 2016 48 mins
    According to the latest annual Webroot Threat Brief, 97% of malware is unique to a specific endpoint, rendering static, signature-database security virtually useless. In fact, many attacks are staged, delivered, and terminated within a matter of hours, or even minutes, having harvested user credentials and other sensitive information. With the rising popularity of polymorphism and other trends, it is more crucial than ever that organizations strengthen their security postures with next-generation endpoint protection and real-time, highly accurate threat intelligence. Join this webinar for an in-depth discussion of the most recent quarter’s malware stats and trends, and how businesses can leverage this data to keep themselves, their users, and their customers safe from advanced attacks.
  • Cloud security best practices for defending against APTs Cloud security best practices for defending against APTs Tyler Moffitt | Senior Threat Research Analyst Recorded: May 31 2016 43 mins
    Year over year, newer and more inventive social-engineering techniques, such as watering hole attacks and spear phishing, are combined with malware attacks to trick users into handing over their personal information. Traditional security solutions are unable to keep up with these new threats and provide effective solutions. By using big data analytics and security intelligence, a Security-as-a-Service platform provides real-time protection to millions of end users daily. This will define the next generation of cloud-based threat identification and advanced persistent threat prevention by leveraging collective cloud-hosted intelligence to offer up-to-the-minute protection—both on the web and across all device platforms.

    Attendees will leave this presentation with:
    • An overview of the common threats and methods used to perform attacks.
    • A summary of the impact such threats bring to both users and businesses.
    • A better understanding of the challenges and benefits of deploying a cloud-based security solution.
  • The Threat Landscape of Today and Tomorrow The Threat Landscape of Today and Tomorrow Tyler Moffitt, Sr Threat Research Analyst at Webroot, Inc. Recorded: Apr 12 2016 48 mins
    Today's advanced malware is increasingly difficult to remove and often even harder to detect in the first place. In this presentation, we examine the modern threat landscape and discuss the shortcomings of traditional antivirus; as well as how organizations can stay ahead of the malware curve. Malware authors aren't too concerned about what your traditional AV is capable of blocking since they've formed reliable tactics to circumvent that protection. Either through social engineering or advanced evasive tactics, traditional antivirus technology is fighting an uphill battle to defend against it. Learn about highlights and revelations from Blackhat 2015; specifically about the 1.4 million Chrysler vehicle hack, how windows software update services can be hacked, the future of biometrics, and the progress encrypting ransomware. We also will talk about updates on law enforcement's attempts to catch cybercriminals. We will also discuss the startling trends we've seen from phishing attacks and mobile malware and what it means for an end user.
  • Today’s Threats and What They Mean for Tomorrow - 2016 Webroot Threat Brief Today’s Threats and What They Mean for Tomorrow - 2016 Webroot Threat Brief Grayson Milbourne, Security Intelligence Director at Webroot, Inc. Recorded: Mar 16 2016 47 mins
    2015 was yet another record setting year in the world of Internet security. More malware, malicious apps, websites, IP’s and phishing sites were discovered than in any previous year. At the same time, attacks on businesses and individuals continue to increase at an alarming rate.

    This presentation will look at data from Webroot’s 2016 Threat Brief and examine threat trends and draw comparisons to data from Webroot’s 2015 Threat Brief. Most notable is the near complete utilization of polymorphic distribution models for malware whereby over 97% of infections today are intentionally unique for each infected system. Attend to learn about the impacts of this strategy as well as many other aspects of the constantly evolving threat landscape.
  • What MSPs Really Need and Want from an Endpoint Security Vendor What MSPs Really Need and Want from an Endpoint Security Vendor Andrew Bagnato, LabTech Technical Account Manager at Webroot, Inc. Recorded: Feb 18 2016 49 mins
    Today’s MSPs face a world full of malware, and not many options when it comes to productive and profitable endpoint security. Join us as we dive into the wants, needs and challenges of MSPs, and how Webroot SecureAnywhere Business Endpoint Protection uses a smarter approach to address these pain points. During this webinar you will learn how endpoint security can be profitable for MSPs with the following features:

    •Real time threat intelligence
    •Detection with a 99.7%+ efficacy
    •Automatic remediation
    •Multi-tenant cloud based management console
  • Crypto Ransomware: What You Really Need to Know Crypto Ransomware: What You Really Need to Know George Anderson, Director Product Marketing and Tyler Moffitt, Senior Threat Research Analyst Recorded: Jan 19 2016 47 mins
    Due to the ever-changing nature of the Crypto* family and other ransomware, the sad truth is that no vendor can guarantee 100% protection. But, between advanced defenses with heuristic detection and a solid cybersecurity best practices strategy, it is possible to protect your business and data from these insidious threats.

    This webinar will examine:
    » How ransomware is developed, and who the newest players are
    » Why ransomware is so good at getting around the usual defenses
    » Your best chance at beating the threat (and minimizing the impact in the case that you don’t)
  • AVAR Unraveled: Anti-virus Asia Researchers International Conference AVAR Unraveled: Anti-virus Asia Researchers International Conference Grayson Milbourne, Security Intelligence Director at Webroot, Inc. Recorded: Dec 9 2015 46 mins
    While many are familiar with the more mainstream security conferences, such as RSA, BlackHat and Virus Bulletin, AVAR is an international conference put on by the Association of Anti-Virus Asia Researchers, meeting for the 18th year, which focuses on the specific topic of malware research and analysis.

    This presentation will review the content delivered at this conference and highlight the challenges and successes researchers have faced over the past year when analyzing malware to secure our online future.
  • Black Hat 2015 Findings – Staying Ahead of Malware Black Hat 2015 Findings – Staying Ahead of Malware Tyler Moffitt, Webroot Senior Threat Research Analyst Recorded: Nov 17 2015 49 mins
    2015 has been a huge year for malware. Learn about highlights and revelations from Black Hat 2015, specifically how the windows software update services can be hacked, the future of biometrics, and the progress of scams and other victim-initiated payments like ransomware.
    We will also discuss the spikes we've seen from phishing attacks this year and what it means for an end user.
  • Why Cloud-based Secure Web Gateways are becoming so darn popular Why Cloud-based Secure Web Gateways are becoming so darn popular George J. Anderson, Product Marketing Director at Webroot Inc. Recorded: Oct 20 2015 31 mins
    Web security is back on the IT Security agenda in a big way. With breaches caused by web usage at an all-time high security professionals are realizing that relying solely on endpoint security to protect their users is downright negligent.

    This presentation explores why with this reappraisal is happening and why so many companies are opting for SaaS cloud-based Secure Web Gateway solutions. It also looks at how Webroot, using its BrightCloud Threat Intelligence platform, have completely updated their existing cloud-based web security service to provide a new logical first line of security defense for web users.

    KEY TAKEAWAYS:
    1.Why web security should be the primary user security defense layer?
    2.The advantages of cloud-based web security over traditional on-premise solutions.
    3.The benefits your organization will see as a result of cloud-based web security.

Embed in website or blog