Hi [[ session.user.profile.firstName ]]

Information Technology Security

  • Date
  • Rating
  • Views
  • The Criminal Chase for Cryptocurrency
    The Criminal Chase for Cryptocurrency Tyler Moffitt | Sr. Threat Research Analyst Recorded: Sep 5 2018 55 mins
    For years, cybercriminals have been experimenting with new ways to steal and extort money from their victims. Ranging from the fake FBI computer locks that demanded Ukash and Moneypak; to the emergence of cryptocurrency and its part in the ransomware business model; to today's crypto-mining attacks, this presentation will explore the past decade's worth of crypto-activity and how you can stay safe.
  • Training: Don't Take The Bait, Avoid Getting Phished
    Training: Don't Take The Bait, Avoid Getting Phished Michael Price | Sales Engineer Recorded: Aug 1 2018 31 mins
    “My business is too small to be a target.”
    “My employees already know better than to click phishing links.”

    Sure, those are the usual lines. But you know the truth: cybercriminals are targeting your end users. In fact, 93% of breaches* are caused by users falling for phishing traps.

    Join our complimentary webinar to hear how you can drastically reduce the phishing risk to your business by training your end users to be a strong line of defense.

    We’ll discuss how to:

    •Assess your users’ ability to spot real-world phishing attacks
    •Deliver training to help your end users identify phishing and other social engineering tactics
    •Plan, schedule, and run successful Security Awareness Training programs to reduce risk
  • The Truth Behind Machine Learning
    The Truth Behind Machine Learning George Anderson | Director of Product Marketing Recorded: May 24 2018 31 mins
    Over the past couple of years nearly every new security vendor, and many of the established vendors have started talking about Machine Learning as if it’s something new. Webroot won an innovation Edison Award in 2012 (over 6 years ago) for our use of Machine Learning in conjunction with our Webroot SecureAnywhere endpoint security. And, now we hear terms like Next Gen; AI; Machine Learning; Neural Nets and more banded around like they are something revolutionary, when frankly they are passé, out of context, buzzwords most of the time.

    This webinar will take you through how Webroot has been applying machine learning for well over 10 years now to create actionable threat intelligence to stop attacks across a wide range of threats and help you understand Machine Learning past the hype.
  • Fortifying Your First Line of Defense through Security Awareness Training
    Fortifying Your First Line of Defense through Security Awareness Training Dan Fox | Product Manager Recorded: Apr 24 2018 43 mins
    According to the latest Verizon Data Breach Investigations Report, human error was directly involved in 65%* of successful breaches in the last year, proving cybersecurity isn’t just a technology issue. People are the first line of defense against cyber threats, so educating them should be a major priority at your organization.

    Join our upcoming webinar to learn about the risks associated with user error, and how security education can boost your bottom line.
  • Smarter by the Numbers. Smarter You. Webroot 2018 Threat Report
    Smarter by the Numbers. Smarter You. Webroot 2018 Threat Report Tyler Moffitt | Senior Threat Research Analyst Recorded: Apr 23 2018 54 mins
    Get the facts you need to stay safe against today's threats.

    When it comes to cybersecurity, change is the only constant. Analysts, researchers, and security companies worked quickly to identify and block emerging threats throughout 2017, but attackers were just as quick in finding new ways to evade defenses.

    The Webroot Threat Report shares a glimpse into our discoveries and analysis of threat activity during the year to equip you with the knowledge you need to overcome modern cybercrime.

    The report covers:
    - Trends in malware and potentially unwanted applications (PUAs)
    - IP addresses and their impact on security
    - Latest trends in ransomware and cryptojacking
    - How URL reputations and classifications help combat attacks
    - The evolution of phishing attacks
    - Mobile application threats
  • Webroot Smarter Cybersecurity | For The Connected World
    Webroot Smarter Cybersecurity | For The Connected World Webroot Recorded: Mar 22 2018 2 mins
    Watch this video to learn how Webroot provides smarter cybersecurity solutions to businesses all over the world.

    Try Webroot for yourself at webroot.com/businesstrials
  • Webroot DNS Protection | Stop Threats Before They Hit Your Network
    Webroot DNS Protection | Stop Threats Before They Hit Your Network Webroot Recorded: Mar 19 2018 2 mins
    From websites that deliver malvertising to drive-by downloads that drop ransomware from a command and control server. Uncontrolled web usage is a huge risk for any business, no matter the size. But you can't just not use the internet. So how do you keep your business, end users and customers safe? -- With advanced web filtering at the DNS layer. Watch this video to see Webroot in action for yourself.

    Learn more at webroot.com/us/en/business/dns-protection
  • Securing Guest WiFi with SecureAnywhere® DNS Protection
    Securing Guest WiFi with SecureAnywhere® DNS Protection George Anderson | Director of Product Marketing Recorded: Mar 14 2018 35 mins
    Uncontrolled web usage is a risk for any organization, especially when average, non-business devices with questionable security can use your WiFi. You need to protect the people and devices that connect to your network—but you also need to protect your network from the risks those connections bring.

    Webroot SecureAnywhere® DNS Protection is an easy, straightforward way to secure guest/public WiFi connections, enforce acceptable web access policies on guest devices, gain visibility, and block up to 88% of malware before has the chance to damage your business and reputation.

    Join this webinar to learn all about Webroot SecureAnywhere® DNS Protection Guest WiFi.
  • Webroot Endpoint Protection | A Modern Approach To Modern Threats
    Webroot Endpoint Protection | A Modern Approach To Modern Threats Webroot Recorded: Mar 13 2018 3 mins
    Traditional endpoint security is dead. Watch this video to see how Webroot's cloud based architecture takes the workload off endpoints and into data centers where behavior recognition immediately categorizes threats. See for yourself how the Webroot Intelligence Network protects you individually in stopping malware in real time. Threats are captured and analyzed in milliseconds. There is a reason we receive more 5-star reviews than any other Endpoint Security vendor!

    Learn more at webroot.com/endpoint
  • Keeping your Business off the Cybercrime Hit List in 2018
    Keeping your Business off the Cybercrime Hit List in 2018 Kelvin Murray | Threat Research Analyst Recorded: Feb 21 2018 35 mins
    2017 saw a significant number of major events that showcased cybercriminal inventiveness. So-called “soft targets”, i.e., companies without adequate security measures or resources, were hit harder than ever before and will continue to be on cybercriminals’ hit lists. In this webinar, we’ll discuss the malware trends and tactics that prevailed in the last year, and how you can keep your business ahead in 2018.

Embed in website or blog