Hi [[ session.user.profile.firstName ]]

Norse Live Attack and Threat Intelligence

  • Date
  • Rating
  • Views
  • Actionable Intelligence: A Threat Intelligence Buyer’s Guide Actionable Intelligence: A Threat Intelligence Buyer’s Guide Rick Holland at Forrester Research, Jeff Harrell at Norse Recorded: Feb 26 2015 48 mins
    Today’s threat actors are more sophisticated than ever, and organizations need live attack intelligence that alerts them to emerging threats long before they become full-blown attacks that lead to sensitive data loss. Furthermore, organizations need the most current threat data available in order to protect their networks from incursions – they need real-time actionable intelligence.

    Join us for the upcoming webinar, “Actionable Intelligence: A Threat Intelligence Buyer’s Guide” featuring Rick Holland, Principal Analyst at Forrester Research, and Jeff Harrell, Senior Director, Product Marketing at Norse, to learn how to evaluate the various threat intelligence offerings in the marketplace, and how to utilize them to prevent today’s advanced attacks.

    In this webinar you will learn about:
    * The criteria needed to effectively evaluate threat intelligence solutions that meet your organization's needs
    * The value of the different types and sources of internal and external threat intelligence
    * How best to utilize threat intelligence to realize a greater return on security investments and better protect your organization
  • How I Learned to Stop Worrying and Embrace the Deep Dark Web How I Learned to Stop Worrying and Embrace the Deep Dark Web Charles Blas, Technical Product Manager, Norse Recorded: Dec 4 2014 47 mins
    When people read about "Tor and the deep web" in the media, it's usually referring to the black markets selling illicit drugs, stolen credit card data, illegal weapons and more. However, increasingly Tor and other anonymous proxies are also being used to conceal threat vectors.

    This increasing use of Tor and similar technologies presents continuing challenges for IT security departments. Aside from the obvious attacks originating from the tor network, advanced malware is also using Tor to obfuscate C&C (command and control) channels, making it harder to detect, contain, and eradicate this malware in your environment.

    In this second part of our series on Tor and the deep web, we'll explore these issues and discuss strategies you can use to help mitigate the risks of such technology. Join this informative webinar to learn:

    * Three perspectives on Internet anonymity as presented from a political activist, a criminal, and an infosec professional
    * What's left of the illicit deep web marketplaces in the wake of project Onymous and what risks they really pose
    * How advanced malware is using Tor to subvert and bypass your security controls, and what you can do about it
  • Threat Intelligence - A Market for Secrets Threat Intelligence - A Market for Secrets Wendy Nather-451 Research, John Masserini-MIAX Options, Sam Glines-Norse Recorded: Nov 21 2014 52 mins
    As the arms race escalates between attacker and defender, many organizations are looking to threat intelligence as a way to bolster the efficacy of their existing security controls, make more informed risk decisions, and prioritize their responses. As the market for threat intelligence solutions has evolved rapidly in recent years, security professionals must now consider new and different criteria to select products and services that best supports their organization's specific uses cases and business objectives.

    Join Wendy Nather of 451 Research, John Masserini, CISO of MIAX Options, and Sam Glines, CEO and co-founder of Norse for a discussion of the current state of threat intelligence market, key criteria and real world considerations for selecting solutions to protect your environment.

    In this webinar you will learn:

    * What threat Intelligence is, the different types, and the current market trends
    * Lessons learned by a financial services CISO when selecting and deploying threat intelligence in a SOC
    * The key criteria for evaluating threat intelligence solutions and services
  • TOR & the Deep Dark Web: Managing the Risks of Internet Anonymity TOR & the Deep Dark Web: Managing the Risks of Internet Anonymity Scott Fitzpatrick, Security Sales Architect, Norse; Anthony Bargar, Senior Security Consultant Recorded: Oct 23 2014 57 mins
    When faced with the challenge of identifying, understanding and mitigating network security risks, TOR and the Deep Dark Web present obstacles that are increasingly difficult to overcome. Created as a means of protecting the privacy and anonymity of its users, TOR - the managed network of private computers leveraged by criminal elements to minimize the risk of surveillance and capture - is being exploited by the most technically proficient, aggressive, and organized of criminal syndicates. TOR has emerged as a the network of choice in the Deep Dark Web for enabling illegal transactions involving weapons, drugs, stolen information, and is also often used as an anonymous communication channel for botnets advanced malware command and control (C&C).

    Join this webinar by Norse to learn:

    * What is TOR and the deep or "dark web?"
    * The primary security and business risks they pose to organizations
    * Strategies and countermeasures your organization can use to mitigate the risks
  • Actionable Intelligence: A Threat Intelligence Buyer’s Guide Actionable Intelligence: A Threat Intelligence Buyer’s Guide Rick Holland at Forrester Research, Jeff Harrell at Norse Recorded: Sep 25 2014 48 mins
    Today’s threat actors are more sophisticated than ever, and organizations need live attack intelligence that alerts them to emerging threats long before they become full-blown attacks that lead to sensitive data loss. Furthermore, organizations need the most current threat data available in order to protect their networks from incursions – they need real-time actionable intelligence.

    Join us for the upcoming webinar, “Actionable Intelligence: A Threat Intelligence Buyer’s Guide” featuring Rick Holland, Principal Analyst at Forrester Research, and Jeff Harrell, Senior Director, Product Marketing at Norse, to learn how to evaluate the various threat intelligence offerings in the marketplace, and how to utilize them to prevent today’s advanced attacks.

    In this webinar you will learn about:
    * The criteria needed to effectively evaluate threat intelligence solutions that meet your organization's needs
    * The value of the different types and sources of internal and external threat intelligence
    * How best to utilize threat intelligence to realize a greater return on security investments and better protect your organization
  • Leveraging Threat Intelligence in Security Monitoring Leveraging Threat Intelligence in Security Monitoring Mike Rothman at Securosis; Jeff Harrell at Norse Recorded: Aug 21 2014 54 mins
    With today's advanced threats and malware evading traditional security controls at an alarming rate, the role of security monitoring has become more important than ever.

    While SIEM and big data security analytics solutions excel at the collection and analysis of an organization's internal data, enrichment of the data with external threat intelligence has proven to be a powerful solution for enabling the rapid detection of advanced malware and breaches and improving the incident response process.

    Join us for the webinar "Leveraging Threat Intelligence in Security Monitoring", featuring Mike Rothman, President and Analyst at Securosis and Jeff Harrell, Senior Director-Product Marketing of Norse, to learn about the security monitoring process and how to leverage threat intelligence for the rapid detection of advanced malware threats and improvement of the incident response process.

    In this webinar you will learn:

    * How to update your security monitoring process to integrate threat intelligence and malware analysis
    * The value of the different types and sources of both internal and external threat intelligence
    * How to score quick wins with threat intelligence, as well as creating longer term sustainable advantages
  • Widespread Compromise: Healthcare Organizations and the Internet of Things Widespread Compromise: Healthcare Organizations and the Internet of Things Barbara Filkins, SANS; Jeff Harrell, Norse Recorded: May 13 2014 38 mins
    What types of sites, endpoints and devices in the healthcare community are actually infected, stealing information and hosting other malicious activities? Attend this webinar and learn how the Internet of Things is contributing to widespread compromises in healthcare organizations from small doctor’s offices to the largest pharmaceuticals. SANS developed this healthcare cyberthreat report based on threat intelligence data gathered by Norse related to healthcare organizations in the US. The report details how healthcare organizations of all types have been compromised by successful attacks.

    Among the key findings:

    * Every type of healthcare organization was represented, from hospitals to insurance carriers to pharmaceutical companies
    * Compromised devices included everything from radiology imaging software, to firewalls, to Web cameras, to mail servers
    * A significant number of compromises were due to very basic issues such as not changing default credentials on firewalls
  • Combating Advanced Cyber Threats with McAfee and Norse DarkThreat Intelligence Combating Advanced Cyber Threats with McAfee and Norse DarkThreat Intelligence Eric Monteith, Director, Product Management, Network Threat Response and Mike Jawetz, VP of Sales Engineering, Norse Recorded: May 8 2014 38 mins
    Threat intelligence is a critical tool in the never-ending struggle to protect the world’s networks, but many threat intelligence solutions lack visibility into the parts of the Internet where bad actors operate—the darknets. As the effectiveness of these solutions declines, organizations are exposed to increased risk of security breaches, data ex-filtration, and loss of reputation and revenue from today’s advanced cyber threats.

    McAfee and Norse have developed an integrated threat intelligence approach leveraging the strengths of McAfee's Cloud Analysis and Deconstruction Service (CADS) framework with Norse’s unique ability to provide visibility into the Internet's darknets and deep web. When combined in an automated fashion with machine-to-machine interface, users now have a single-pane-of-glass with rich context to track new organizational threats not detected through traditional means.

    Join this webcast to learn about:
    •The value of Dark Threat Intelligence and its role in preventing compromise and data breaches
    •Threat intelligence-based strategies for advanced threat prevention and detection
    •Using threat intelligence to streamline and improve the incident response process
  • Exposing Malicious Threats to Health Care IT Exposing Malicious Threats to Health Care IT Barb Filkins at SANS; Jeff Harrell at Norse Recorded: Mar 6 2014 59 mins
    What types of sites, endpoints and devices in the healthcare community are actually infected, stealing information and hosting other malicious activities? Based on a study of more than six million points of presence, thousands of which belong to the healthcare industry and exhibit hostile behavior, learn more about problems in the health care industry and what can be done to overcome them, as well as other fundamental questions specific to the industry.
  • Combating cyber threats using Splunk and Norse Live Threat Intelligence Combating cyber threats using Splunk and Norse Live Threat Intelligence Mark Seward, Sr Dir of Security & Compliance Marketing at Splunk and Mike Jawetz, VP of System Engineering at Norse Recorded: Feb 13 2014 62 mins
    Enriching SIEM data with external threat intelligence has proven to be a powerful solution for rapid detection of advanced malware and data breaches and improving security analysts' productivity.

    The Splunk security intelligence platform now provides a seamless, real-time integration with the Norse IPViking and Darklist live threat intelligence services enabling correlation of contextual, risk-weighted and continuously-updated threat intelligence with Splunk data.

    Together Splunk and Norse enable security professionals to react and respond in real-time to prioritized advanced threats and further reduce time from data to insight.

    Watch this webinar to learn:
    * The value of live threat intelligence and its role in preventing data breaches
    * How Splunk uses on-demand risk scoring data from Norse for determining threat severity
    * How Splunk de-duplicates threat data to reduce the noise generated by multiple threat feeds

Embed in website or blog