As an IT professional, many of the problems you face are multifaceted, complex and don’t lend themselves to simple solutions. The information technology community features useful and free information technology resources. Join to browse thousands of videos and webinars on ITIL best practices, IT security strategy and more presented by leading CTOs, CIOs and other technology experts.
With the recent global attacks of WannaCry and NotPetya, ransomware has taken the headlines in a massive way. But this is nothing new, the 2014 Crypto locker attacks still in the back of the minds of many organisations. In order to help organisations understand ways to cope with ransomware attacks SecureWorks very own CTU e-crimes lead, Alex Tilley, and senior incident responder, Dan Eden will discuss a brief history of ransomware. Discussing where ransomware originated, some examples of attacks from times gone by and discuss the what, the how, the why, and the who of some of these attacks. Alex and Dan will also provide some tips and tricks to give your organisation the ability to reduce the risk of ransomware affecting your organisation.
Machine learning and machine intelligence have moved into the corporate datacenter. Along with seeing live demos of machine learning in action, attendees will learn how advanced algorithms can rapidly analyze large data sets to find relevant patterns, and employ inferential learning to make real-time adjustments to datacenter processes.
- Broadcast LIVE from Las Vegas during Black Hat 2017 -
Disruptors and visionaries across the globe are pushing the boundaries of science and technology, economics and industry, healthcare, policy, communications, and governance. From these advances emerge new career paths, educational disciplines, and opportunities for creation and discovery.
But things don't always work the way we expect them to, and the consequences of disruption are impossible to predict. What is sacrificed for the sake of efficiency or convenience? Who gets to make that call? Whose fault is it when pre-teens get radicalized online, or health records get misused for unauthorized research? And whose job is it to prevent that from happening? Is prevention even possible?
Individuals, enterprises, and society writ large have the right and responsibility to proactively shape and secure the future, but our ability to do so is at risk. As technology continues to proliferate without being well understood, people who fall victim to its failure or misuse feel more and more disempowered to prevent future damage. This is The Tech Effect: the complacency driven by the complexity of the technology ecosystem, and a rejection of responsibility for individual and collective safety, security, and ethics.
It’s time to take charge of our digital future.
Join us for this lively conversation as the experts explore the following:
- What is a technology ecosystem?
- Who are the players?
- What are their roles?
- What are the challenges with security and privacy?
- What are the challenges with ethics? How do they compete with capability, capitalism, security, and privacy?
- What might the long-term impact on humanity be?
Containers provide application owners and IT datacenter operators with a flexible model to quickly provision and de-provision applications—without worrying about infrastructure compatibility. This advanced technology session will cover container basics, and detail how Nutanix Enterprise Cloud provides the ideal scale-out platform for running containerized apps.
We're living in a centralized world—but that’s all about to change with the proliferation of Intelligent IoT devices, sensors and machine to machine (M2M) communication. Big data, security, governance and compliance are just a few of the key challenges to consider. Attendees will learn how to create and run agile intelligent M2M applications, analyze and predict behavior and drive greater business value.
Does this sound familiar? It’s month end… time for reconciliations, account analysis, journal entries, and long hours. Pulling multiple reports to get to the necessary subledger transactions can be tedious and time consuming. Booking journal entries, tying out accounts, plus more, all in different systems and tools is inefficient and error-prone. What if you had a tool that can simplify these processes, plus more? In this webinar, we will show you GL Connect, a month end tool that allows:
•Reconciliations with full drill down to the subledger
Task Types and Effort Driven can be two of the most confusing features of Microsoft Project, both to novice users and to experienced users alike. For example, have you ever changed one number in Microsoft Project, and then the software changed another number in response, and you don’t know why?
Guest expert Dale Howard will unlock the mysteries of Task Types and Effort Driven behavior in Microsoft Project, showing you how their behavior is logical, predictable, and meaningful.
Join this webcast to:
- Eliminate the confusion around these two Microsoft Project features
- Harness the power of Task Types in your own projects
- See how Effort Driven task statuses interact with each Task Type
As demands on your cloud-native applications rapidly change, how can you ensure that your database is responsive and highly available? The truth is that modern applications are usually still supported by monolithic shared databases and traditional operational practices. Pivotal and Redis Labs are collaborating to bring developers more agility and autonomy with a highly available, scalable, and high performance Redis database service for their cloud-native applications.
Join Roshan Kumar from Redis Labs and Kamala Dasika from Pivotal as they discuss:
- How Redis Labs supports real-time use cases for the modern enterprise
- How Redis Enterprise provides seamless high availability and disaster recovery for Redis applications
- How full life cycle management of your apps and Redis Enterprise via Pivotal Cloud Foundry enables dynamic scale, high performance and uptime
CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.
Quay is CoreOS's enterprise-ready container and application registry. Quay makes it easy for developers to store, manage and deploy container images, and simplifies your development to production workflow for your software containers.
- Broadcast LIVE from Las Vegas during Black Hat 2017 -
As a society, we continue to focus on the capabilities that new technological products and services bring to bear, leaving the security - or rather, the safety - conversation for a later date and time… if at all.
Why is this? Perhaps it’s because we don’t care. Or, perhaps it’s because we don’t understand how things work. Or, maybe it’s because we don’t know all the technical mumbo jumbo. Or, it could just be that we expect “someone else” to take care of it for us. For example, every car has a seat belt, right? We don’t have to ask for the car dealer to add seat belts for us and there really aren’t different types of seat belts available in the commercial car arena. Cars just come with seat belts - period. We expect them to be there - even if some people choose to not wear them.
Regardless of the reason(s) behind the lack of conversation surrounding cybersecurity, we should all be able to agree on one simple fact: we use these new gadgets and services completely unfettered - with little to no regard to the risks we face for our privacy and even our safety.
Attend this session to gain the initial knowledge necessary by:
- Learning to ask is this thing secure?
- Understanding how or why it is or isn’t safe to use.
- Identifying your role in your own cyber safety and that of those around you.
It’s time to open our eyes and become aware of our surroundings. Join us to become aware.
- Debra Farber, Host of The Privacy Pact, ITSPmagazine
- Chris Roberts, Chief Security Architect, Acalvio Technologies
- Dr. Christopher Pierson, CISO, Viewpost
- Arun Vishwanath, Associate Professor at SUNY Buffalo & Black Hat Presenter
Infrastructure can make or break a VDI project. Successful Citrix XenDesktop and XenApp deployments require efficient, high performance and scalable IT infrastructure to deliver a great user experience. Hear from actual VDI project owners about what it takes to make Citrix VDI successful, and get a sneak peek into where Citrix + Nutanix integration is headed next.
IT environments are becoming larger and more complex through organic growth as well as acquisition. Accompanying initiatives—like datacenter migrations, for example—are expensive. Done well, these moves cost $1,200 to $6,000 per server. But when things go wrong? A poorly optimized load balancer could mean downtime for critical application servers – a price that could skyrocket to more than $25,000 per server.
What if IT teams could be guided through the process? What if they had a way to map the plan and troubleshoot issues before they became outages?
In this webinar, we'll share a story from an ExtraHop customer who underwent a large datacenter migration after it acquired a new business. Not only did their IT team undergo a successful migration, they also decreased troubleshooting time and cost to the company by 85 percent – freeing them to move beyond reactive firefighting to proactive solution building for the business.
Elasticsearch is a distributed, RESTful search and analytics engine that can be used with object storage to enhance searchability of metadata searching operations. Join Caringo VP of Product Tony Barbagallo and Caringo Engineer Jamshid Afshar as they take an in-depth look at best practices for using Elasticsearch with object storage and demonstrate use of Elasticsearch with Caringo Swarm Object Storage.
Traditional Endpoint Protection (EPP) products have failed to detect advanced malware that easily evade signature-based antivirus solutions. To counteract this problem, Gartner reports that 100% of EPP solutions will incorporate Endpoint Detection and Response (EDR) capabilities, focused heavily on security analytics and incident response.
Even so, customers are realizing that protecting endpoints alone is not enough to prevent security breaches. That’s where a managed detection and response (MDR) service comes into play. MDR provides 360-degree visibility into endpoints and security devices, and offers 24/7 network monitoring.
In this webinar, you will learn:
- What EDR vendors offer beyond EPP solutions
- Why Endpoint Detection and Response alone is not enough
- How Managed Detection and Response (MDR) makes up for EDR shortcomings
Oracle apps and databases power an organization’s most critical workloads. There is a time to be conservative, but not when it means sacrificing the performance, availability and economics of your Oracle infrastructure. Come listen to veteran enterprise IT managers running Oracle on Nutanix, and loving it. Go home with details about architecting an efficient environment for Oracle eBusiness Suite, deploying test/dev environments and running core Oracle databases in production, and at scale.
This presentation will offer guidance on using the ISO/IEC 15504/33000 Assessment Methodology to conduct a maturity assessment of your Problem Management Process as part of your Continual Service Improvement (CSI) initiative.
With the goal of achieving continuous improvement of the Problem Management Process, ISO/IEC 15504/33000 offers a structured methodology for process baseline and follow-on assessments. As a flexible assessment solution, which can be adapted to a company of any size, an assessment using the ISO/IEC 15504/33000 methodology provides the first step in a Continual Service Improvement initiative.
Join Storage Switzerland and CloudLanes for our live webinar as we compare Iron Mountain to the cloud and provide ways to solve the gaps in public cloud storage's ability to be a viable data preservation service. Pre-register today and receive our new eBook "Using the Cloud for Long Term Data Preservation" in advance of the webinar.
Telecom providers and mobile application developers rely on mobile experience and usage data to drive investment decisions and improve service. But a lack of statistically significant and useful data, coupled with a limited ability to visualize and make sense of large datasets, has made it impossible to make informed, timely decisions.
Tutela and MapD have partnered to provide an industry leading data solution for the mobile industry. Their solution combines billions of rows of crowdsourced data from Tutela with MapD’s GPU-powered data visualization and analytics platform.
Attend this webinar to learn how telecoms and other mobile companies can:
Leverage Tutela’s massive crowdsourced dataset with MapD’s real-time analytics platform to quickly spot trends, problems and opportunities to improve networks.
Rapidly investigate competitors’ network performance and subscriber behaviour, from country to street-level detail.
Access an unparalleled repository of mobile network quality data, including mobile network, device and application usage, market penetration and performance.
Tutela is the world’s largest mobile data crowdsourcing company. Its software is installed on over 200 million devices and collects over 1 billion data points per day.
MapD’s open source analytics and visualization platform leverages the parallel processing power of GPUs to query billions of rows of data in milliseconds, enabling businesses to gather insights from massive datasets.
Try the demo here: https://www.tutela.com/explorer/
Containers are exponentially growing as an agile and efficient way to deploy applications on the cloud. This opens new security challenges for cloud environments. In this session, learn about how Imperva SecureSphere can protect applications leveraging Amazon’s EC2 Container Service (ECS) and walk through a brief demonstration on configuring SecureSphere alongside applications using ECS.
Behavior-Driven Development with Ruby/Cucumber automation is a practical, fail-proof, read-to-use strategy or process that improves software quality and decreases costs.
Ambiguity and miscommunication cause the majority of critical defects and undesirable outcomes in the software development lifecycle. Behavior Driven Development (BDD) ensures that requirements are accurate. It builds a mutual understanding of what should be developed and tested through a common vocabulary.
This webinar introduces BDD methods that promote product quality by generating business requirements in Gherkin (Given-When-Then) format. Tool agnostic, BDD emphasizes communication between business, requirements analysts, developers, and testers to ensure quality expectations are achieved. Describing requirements in the form of system behavior eliminates scope creep and guarantees proper software functionality.
Network engineers and system administrators can spend a great deal of time responding to user complaints and troubleshooting slow performance issues that are difficult to diagnose or replicate. Resolving those issues can be especially problematic if those applications are provided by a third-party vendor or hosted by third parties, such as SaaS EMR applications, claims processing applications, and practice management applications. Often, IT teams do not have enough visibility to determine root causes or to counter claims from third-party vendors and managed service providers that host applications. With real-time insight into end-user experience for these hosted applications, including application-level transaction details, IT teams can hold vendors accountable and identify root causes faster.
Learn how ExtraHop helps you identify the root cause of your IT problems, avoiding unnecessary friction among your IT teams and ransomware by providing full, real-time visibility into which devices are accessing network share and what type of behavior they are exhibiting, backed by machine learning for immediate anomaly detection.
VR creates infinite storytelling possibilities, but it’s also infinitely difficult to pull off. It’s a completely new medium that requires an entirely new way of creating content, and endless inventiveness, and have you ever seen a 360-degree camera?
Join our latest interactive VB Live event to hear how companies are reducing travel expenses but improving employee connection, conducting interviews, and giving presentations. Learn about companies like Walmart using VR technology to train employees; how doctors are leveling up their skills; educators are transforming learning; and audience engagement skyrockets when you give them a whole new way to see, touch and interact.
And discover how consumers are interacting with VR right now, and what the marketplace is expected to look like in the year ahead.
Register now for real talk on the possibilities of virtual reality, the resources you need, and the rules to break.
In this webinar you’ll:
*Hear the results - for the first time - of the latest VR market research
*Discover the compelling business case for VR
*Understand why consumer-generated VR content is important to business
*Find out how companies are using VR content to strengthen their bottom line
*Learn what’s next in the VR content world
* Dean Johnson, Head of Innovation, Brandwidth
* Crystal O’Hea, Senior Director Expedition X, SeaWorld Parks and Entertainment
* Stewart Rogers, Director of Technology, VentureBeat
* Rachael Brownell, Moderator, VentureBeat
Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.
In this session, get details on:
* Why the platform plays a critical role towards disrupting credential-based attacks
* Preventing the theft of credentials, using new PAN-OS 8.0 technologies
* Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
In this webinar, produced in conjunction with Commvault EMEA Platinum Partner of the Year COOLSPIRiT, learn how Commvault's scalable, powerful and simple solutions ensure Application Availability and Robust Data Protection across your entire infrastructure.
Presented by Marc Lucas, Commvault Systems Engineer, find out how to:
* Simplify the move to the Cloud
* Utilise award-winning BaaS, DraaS and SaaS Data Protection
* Obtain greater insight with software defined storage
* Ensure data availability for business-critical applications
* Minimize system downtime with an innovative and scalable solution
COOLSPIRiT provides in-depth knowledge and expertise across the solutions portfolio. Their highly-skilled accredited experts can analyse and review your existing IT infrastructure to recommend and deliver the best value for your business. With proven best practice and multiple use cases, COOLSPIRiT Solutions Architects can help to design, configure and implement a robust IT strategy for data availability, compliance and disaster recovery.
Join Michael Harris on how to build the right high performing teams to meet demand - it’s all about people - How do we make the corporate machine value that and attract, inspire, unlock the potential of and retain, the right people?
He has a unique combination of leadership, industry, coaching and transformational experience. His passion is helping organisations, and individuals, shape and build their future. In a career spanning over 30 years, Michael has worked in Financial Services, Manufacturing, Telecoms, Government and as a freelance consultant.
Michael has a broad experience that has given him unique insight into the future challenges leaders face. As Michael says “One of the most difficult things that leaders need to do is to articulate a clear vision, collaboratively build a strategy and plan to achieve that vision and, most importantly, build a strong and passionate following to bring people with them.”
Tableau is all about making your analytics faster, smarter, and more powerful, so that everyone can get the answers they need. Helping people gain insight into their data to solve unexpected problems is what drives us.
In this webinar, we will explore how Tableau can help with all stages of an analytics project, but focus specifically on a few advanced capabilities. Broadly, we will look at the following scenarios and the capabilities that support them:
-Segmentation and Cohort Analysis
-What-If and Scenario Analysis
-Rand Python Integration
Attend to see how Tableau is making advanced analytics exploratory, faster and more scalable than ever before.
Policy? We have a policy? Have you read the policy? Thats right...who actually reads company policies?
Risk and compliance managers globally have lost the fight against user policy acceptance leading to increasing organisational risk and the decreased ability to stand up and demonstrate effective compliance to regulatory bodies.
Does it have to be this way? In this webinar, we
* Demo what we use to transform and make mainstream what is often boring and ignored.
* Show how you can effectively measure (yes measure and report) on how effective your policy implementation is.
* Better engage and enforce your policies with third parties.
Find out why the CDCP is the most attended course by data centre professionals from all over the world. The CDCP is a must-have for anyone working in and around the data centre industry, whether a vendor/supplier, designer/builder, data centre owner/operator, those involved in daily operations of a data centre or a data centre user/customer. CDCP provides you with the knowledge of all aspects of the data centre and will enable you to talk confidently about the data centre with your colleagues, vendors, customers or your superiors. CDCP certification is a must have for your career in the growing data centre industry.
Over the course of the past year, cyber-attacks have frequently made headlines. In 2017 alone, global ransomware damage costs are expected to exceed $5 billion, with the total cost of cyber-crime expected to reach trillions of dollars.
Darktrace has detected over 30,000 in-progress cyber-threats, and has firsthand experience with modern, never-before-seen attacks, including fast moving ransomware, new strains of malware, compromised IoT devices, malicious insiders, attacks on cloud environments, and more.
Join our Director of Cyber Analysis, Andrew Tsonchev, and our Lead Research Analyst, Bethany Edgoose, as they present Darktrace's 2017 Threat Report, review novel cyber-attacks, and break down how they were detected by the Enterprise Immune System.
As business success grows more reliant on data, technology, and third parties, CISOs and security leaders are finding themselves more often in the spotlight. They're being asked to brief board members, respond to third party requests, guide critical decisions, and make tough strategic calls. These increasing expectations are creating great opportunities for CISOs to shine, but to do so, they need to rise to the occasion. This webinar takes best practices and lessons learned from "superstar" CISOs, explaining what top security leaders are doing to lead their companies successfully through some of today's most complex business and technology challenges.
In this session, we will discuss – and debunk – common misconceptions that you may encounter when planning to modernize your infrastructure. We’ll examine whether ‘build-it-yourself’ modernization deliver the same results as integrated solutions, if a modern infrastructure impacts the role of IT admins, how it effects the ROI of your existing infrastructure, the readiness of a simple, modern infrastructure for enterprise workloads, and whether or not infrastructure modernization leads to vendor lock-in.
Traditionally Security was viewed as necessary cost center or an insurance policy you hoped you’d never have to cash in. Yet by automating security policy management you can actually save your organization both time and money and even enable and support the revenue generation processes.
Presented by Joe DiPietro, SE Director, this technical webinar will provide an overview of how automated security policy management goes beyond providing ROI and cost savings, to directly impacting business productivity and agility.
This webinar will:
* Highlight the security policy processes that can be automated, including challenges, benefits, planning and prioritization considerations.
* Provide an overview of the security management maturity model and highlight opportunities for automation and optimization for each stage of the model.
* Dissect and assess cost saving and revenue generation opportunities for specific key challenges including security change management, risk management, application migration, and auditing and compliance.
CSPs need to engage turnaround strategies to transform customer and employee experience issues across the sector. This will turn current challenges into positives for 2018 and beyond! The latest CX benchmarking report provides insightful findings about the top issues and how to address them through innovative solutions and services.
According to Joe Manuele, Dimension Data’s Group Executive, CX and Collaboration said: “The world has formed a digital skin and business, service, technology and commercial models have changed forever. However, organisations are strategically challenged to keep pace with customer behaviour.” Join us for this webinar where we’ll be discussing the CSP specific findings from the report.
Preparing for GDPR? Are you wondering how you'll track and manage employee compliance?
If your answer is yes, join Amanda and Chloe live on July 27th for this 45-minute FREE, educational webinar: 'Using Assessments for GDPR Compliance'.
During this webinar, Amanda and Chloe will talk you through the basics of GDPR and show you how to achieve compliance by not only training your people but testing their knowledge so you can prove you’ve taken every step to fulfil the regulation and prevent data breaches.
Amanda Maguire is a senior education architect with over 20 years' experience on business transformation programmes. With a career focused on the impacts on people – project team members, end users, suppliers and customers, Amanda has a passion for effective and engaging education, enabling people through innovative learning interventions. Her experience is wide ranging - from national to global programmes in a variety of industries.
Chloe Mendonca is a Marketing Manager who leads a variety of digital communication campaigns and events across EMEIA. She is particularly fascinated by the way digital technology is changing the world and enjoys helping organisations worldwide realise the power of Questionmark's assessment management system. For the past 5 years, Chloe has worked with businesses across an array of verticals, sharing their stories.
Is your company on a data-driven digital transformation journey?
With cloud being a strong directive, managing the enterprise data across cloud and on-premises environments is a common impediment in this journey. However, you are not alone when facing this hybrid data management challenge.
Join Forbes contributor and analyst, Joe McKendrick and James Humphrey, Principal Architect at National Instruments as they share critical business drivers, use cases and challenges shaping the success of the journey to cloud.
In this webinar, you will learn:
- Current digital transformation market trends driving the influence of cloud.
- Role of hybrid data management
- How National Instruments is growing at scale and reducing time to market for their products and services
- How National Instruments is making cloud work for their Data Lake projects to scale cost-effectively and augment existing hybrid landscape
Traditional methods for vulnerability discovery are failing us. With rapidly expanding attack surfaces, motivated adversaries, and the growing shortage of full-time infosec professionals, organizations are fighting a losing battle. One thing is clear: We need a new approach.
Enter the Bug Bounty model. Bug bounties have quickly evolved from a “nice to have” to a “must have” for most application security teams.
What’s behind this trend? Why are bug bounties growing, and why now?
Join our expert panel as we discuss the key findings from The 2017 State of Bug Bounty Report.
- Casey Ellis, Founder & CEO of Bugcrowd
- Jeremiah Grossman, Chief of Security Strategy at SentinelOne
- HD Moore, Founder of The Metasploit Project
In this webinar, Healthcare Analytics Expert, Dr. Gwen O'Keefe will explore analytics capabilities that have transformed other industries, like healthcare, and how they can be applied to yours. She'll outline the key steps for success and adoption of predictive analytics projects and share how to advance the use of predictive analytics and machine learning to improve all aspects of your business.
It’s not news to anyone in IT that container technology has become one of the fastest growing areas of innovation. We’re excited about this trend and are continuously enhancing Google Cloud Platform (GCP) to make it a great place to run containers. Join us to learn more about how to get started with GCP and why it is the “container-optimized” cloud.
A study by McKinsey suggests the increased operational risk of digital innovation threatens 6% of the net profit for a retail bank. Renowned hactivist group Anonymous’ OpIcarus; a Distributed Denial of Service (DDoS) attack siege on the world’s banking infrastructure and other well publicized successful attacks have exposed just how vulnerable banks are to such threats. The reality is modern day DDoS attacks are getting more frequent, more sophisticated, and are commonly used as a distraction during the data exfiltration stage of advanced threat campaigns. The unfortunately reality is that in many cases, these attacks succeed because the targets were simply inadequately prepared to stop them.
Join this webcast to learn:
•The latest trends in DDoS attacks.
•Commonly overlooked costs due to DDoS attacks.
•And best practices in DDoS attack defense.
Prevent, detect, respond and assess, all through a single agent
Did you know McAfee is no longer a leader in industries Magic Quadrant? While your endpoint security is at risk, how many agents/modules do they require you to install? How many servers? And with all that, are you getting the right level of endpoint protection against advanced threats?
Symantec provides the most complete endpoint security in the world - from threat prevention, detection, response and assessment with the highest efficacy and performance.
In this webinar, you’ll learn how to:
· Drastically improve your protection and security posture with various next-gen capabilities like Advanced Machine Learning and Exploit Prevention
· Perform incident investigation and response using the same agent using the integrated Endpoint Detection and Response solution
- Obtain automated security risk assessment and track effectiveness against security policy changes via a cloud console
· Lower your IT burden and reduce complexity with everything built into a single agent
· Facilitate a painless migration and get your IT staff up-to-speed
Finally, see a demo that showcases how Symantec stops ransomware and unknown threats with Next-gen technologies built into a single light weight agent.
Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.
Join us Thursday, July 27, 10 AM PT for a live demo that will explore Proofpoint Email Protection and Targeted Attack Protection.
-- Today’s threat landscape and to how to build your defense against spam, malware, and non-malware threats
-- Approaches for identifying suspicious messages
-- The latest in security software to fight against advanced threats
Cloud services have emerged as the preferred attack vector of some of the most dangerous and innovative cloud malware exploits of the past six months. Why? Because many organizations don't inspect their cloud SSL traffic for malware and the same functionalities of the cloud dramatically increase productivity (sync, share, collaborate, etc) also provide ransomware developers with a perfect medium for faster delivery of malware payloads to more targets.
Join Netskope chief evangelist, Bob Gilbert, and Threat Detection Engineer, Sean Hittel, for a fascinating look at how malicious actors now design ransomware to make best use of popular cloud services to hide in plain sight, and do more damage in less time.
Bob and Sean will provide technical analyses of recent malware campaigns discovered or documented by Netskope Threat Research Labs and how to defend against them. These include:
• Virlock, which encrypts files and also infects them, making it a polymorphic file infector
• CloudFanta, which uses the SugarSync cloud storage app to deliver malware capable of stealing user credentials and monitoring online banking activities
• CloudSquirrel, which takes advantage of multiple cloud apps throughout the ransomware kill chain with the intent to steal and exfiltrate user data
• The Zepto variant of Locky ransomware, now distributed both by popular cloud storage apps and via DLL
This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.
In this presentation, our Unit 42 Threat Intelligence team will show you:
• How credential theft and abuse were used in real world attacks
• Demonstration of tools attackers use to capture credentials.
• How attackers buy and sell credentials on the dark web to further their criminal operations.
Containers can make it easier for developers to know that their software will run, no matter where it is deployed. This webcast, presented by the SNIA Cloud Storage Initiative and the SNIA Solid State Storage Initiative, will discuss how persistent memory is a revolutionary technology, which will boost the performance of next-generation packaging of applications and libraries into containers.
•What SNIA is doing to advance persistent memory
•What the ecosystem enablement efforts are around persistent memory solutions
•How NVDIMMs are paving the way for plug-n-play adoption into containers environments
Join SNIA experts, Arthur Sainio, SNIA NVDIMM SIG Co-chair, Chad Thibodeau, SNIA Cloud Storage member and Alex McDonald Co-chair of SNIA Solid State Storage and SNIA Cloud Storage Initiatives to find out what customers, storage developers, and the industry want to see to fully unlock the potential of persistent memory in a container environment.
Today, with hybrid cloud, collocation sites and managed service options, you can build a robust disaster recovery environment without physically building data centers. Saving money and time. In this webinar you’ll hear best practices to leverage new technologies for an optimal hybrid DR solution.