10 Ways to Tell If It's Time to Change Your Anti-Virus Software
If you are like most small businesses you have probably experienced issues with anti-malware software in the past. Do any of the issues below ring true when thinking about your current antivirus solution?
• When it performs scans it slows our systems to a crawl
• It creates too many alerts on files that aren’t malicious
• It is hard to manage across all our platforms and devices
• Our users want to turn it off because it is so annoying
If so, join Peter Streips, Network Security Group (ESET’s Gold Partner) President and ESET researchers for a panel discussion and learn why it’s time to change your antivirus solution.
RecordedJun 6 201259 mins
Your place is confirmed, we'll send you email reminders
Ben Reed, Sr. Technical Content Strategist and Sales Engineer and Robert Westervelt, Research Manager, IDC Security Products
Why have two-factor authentication (2FA) in the workplace? Even if you’ve instituted password management best practices, employees will still use their work password on other websites, write their passwords on sticky notes, or use their nicknames or birthdays without a second thought—and put your business at risk.
With new PCI-DSS regulations surrounding multi-factor authentication requirements coming up on Oct. 31, it’s time to get up to speed on this proactive technology.
In this webinar, Robert Westervelt, research manager of IDC’s Security Products group, and ESET’s solutions engineer Ben Reed will provide an in-depth overview of the following:
•Account credential theft: What can be done to prevent employees from falling into a trap?
•How 2FA/multi-factor authentication can reduce the risk of account hijacking, mitigate weak passwords and help satisfy compliance requirements.
•The types of multifactor authentication solutions available on the market and how it can contribute to creating a stronger security culture in the workplace.
ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
ESET North America & Michael Aguilar, Business Product Technical Lead
Winter is coming. Our three-eyed raven answers your top 5 IT security questions based on our most recent survey including email security, ransomware, protecting IoT and more. Additionally, here's your chance to ask our in-house cybersecurity expert, Michael Aguilar, your most challenging questions to help you defend the wall. It’s an open forum just for you!
With a personal record of 34 questions in 30 minutes, Michael will torch your questions like Drogon. Sign up today and get those questions ready.
Michael Aguilar, Business Product Technical Lead, ESET North America
You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
Join an ESET business product technical lead to learn:
•How ransomware has evolved and spread
•Why mobile phones and Apple OS X are increasingly vulnerable
•Best practices for avoiding and dealing with ransomware
•Why to implement backup and recovery solutions now
ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.
Key takeaways include:
1.Next Gen AV technologies – making sense of their claims
2.A deep dive into ESET technology
3.The difference between reactive vs. proactive technologies
4.How ESET leverages the Cloud
5.Best practices in evaluating AV technologies
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>
Over the past few years, malware authors have developed increasingly sophisticated and creative ways to infect endpoints. Encrypting ransomware is no longer merely an annoyance. It's a highly persistent and organized criminal activity in full deployment, with Ransomware-as-a-Service at its core. The damage from becoming a ransomware victim is considerable, and can even put organizations out of business.
At Webroot, we believe it's possible to effectively protect enterprises and users, but only by understanding your adversary and the techniques they use for their attacks. In this webinar, Webroot's own Senior Threat Research Analyst, Tyler Moffitt, will offer expert insights into the past, current, and emerging encrypting ransomware variants--and how businesses can stay ahead.
Live from the 2016 Hosting & Cloud Transformation Summit in Las Vegas, Katie Broderick of 451 Research will interview David Leighton, President of Women in Technology about a recent survey of 1,100 WITI members, which found that early STEM (science, technology, engineering and math) exposure is crucial and a variety of support mechanisms are needed to achieve women's goals in a predominantly male field.
Join CounterTack and Paladion Networks for a live webinar as we walk through the attack that shook banks across the globe. We'll hear from the incident response team at Paladion who supported the investigation, and will discuss:
· How the criminals gained access to the SWIFT servers
· The timeline of events that took place
· A fatal mistake that led investigators to the discovery
· Takeaways organizations can learn from to prevent similar attacks
Oggi l’Application Economy richiede un approccio Agile anche nel controllo quotidiano delle infrastrutture IT e nel controllo delle sue performance.
Gli ambienti IT tendono sempre di più ad essere eterogenei con la presenza di sistemi legacy e cloud sia in forma privata che pubblica (hybrid cloud). Allo stesso tempo agli operation manager viene chiesto di essere proattivi e sempre più veloci nel tenere sotto controllo lo stato dei servizi di business erogati.
Un approccio ai tool di monitoraggio a “silos” non risponde a questi requisiti e rischia di mantenere alti i tempi di risoluzione delle criticità e dei problemi (MTTR alti).
CA Unified Infrastructure Monitoring (UIM) consente di avere una visibilità a 360 gradi sulle applicazioni, servizi e infrastruttura (fino al mainframe) in modo moderno e ottimale unificando i vari tools di monitoraggio dipartimentali, offrendo un controllo puntuale sia sui sistemi più tradizionali che sulle nuove tecnologie cloud e micro-service.
Phishing has been well established as the top entry method for hackers trying to access corporate networks. Yet, in spite of record spending on security technology, data breach reports continue to highlight the substantial lag between incident occurrence and detection.
That technology- those investments are failing while organizations continue to neglect their final and best line of defense – their employees. Employees hold the key to fortifying the last line of defense and providing IT and Security teams with critical real-time attack intelligence.
In this presentation, PhishMe’s COO, Jim Hansen, will draw on his 25 years in law enforcement and IT security to discuss:
•The current state of phishing
•The success and failure of technology systems and how human systems can protect the last mile
•How conditioning – not training - activates employees to identify and report phishing attacks
•The critical attack intelligence generated from employees and how it can be used to detect attacks-in progress and aid phishing incident response
Join PhishMe and (ISC)² on Sept 21 (Wed) at 2:00p.m. (Singapore time) for a security briefing on phishing awareness and response.
Presenter: Jim Hansen, Chief Operating Officer, PhishMe
Jim has over twenty-two years’ experience in sales, operations and
executive management in the information security industry,
including co-founding and serving as COO of Mandiant. He has also
held numerous executive and management positions in both sales
and consulting organizations, and regularly speaks and publishes
articles on information security topics.
We all know that data is growing at a really fast rate for a variety of reasons. At the same time, budgets for storing and protecting that growing data are not changing, or not as quickly as the data is growing. The classic ‘do-more-with-less’ drumbeat in IT continues.
With tape as the primary backup target, companies are facing many limitations which are becoming more and more problematic in a world where data security, compliance, and availability are critical.
Hear from Dave Elliot (Google) and Randy Serafini (Veritas) as they discuss about cloud storage, backup, and some of key aspects of making the decisions on moving to the cloud as a backup destination.
Controlling and protecting smartphones and tablets and the applications they run is an important part of the extended endpoint protection environment. Endpoint security is vital, and you need to treat your mobile endpoints with the same urgency as your Windows and server endpoints.
Join Zimperium’s latest webinar featuring Ovum’s Andrew Kellett. Andrew and John will discuss the importance of adding mobile devices to your endpoint security procedures and how to detect attacks via mobile OSs, applications, malware and Wi-Fi networks.
- Mobile Devices are a Viable Vector of Attack
- Ovum Research: Endpoint Security & Mobile Security Requirements Differ
- Enabling mobile devices as threat detection sensors
This presentation will explore not just who is my marketing video audience, but how are they viewing the video? David, Mark, and Mark will discuss the different approaches required for mobile video from the storytelling and the aesthetic/technical perspective.
We'll breakdown these important questions: Can you be sure that your audience will have the audio turned on? Why does direct address to camera work so well for mobile? What’s the ideal length for a mobile video? Could a slick, commercial style video actually be less successful than a playful more personal story?
Addressing these ideas through the concepts of mobile aesthetics, user authenticity, personalization, humor, narrative, and serialization, David, Mark, and Mark explain how to optimize your video marketing for the vast mobile audience.
Gartner has recently alerted enterprise IT, security and mobility managers that Mobile Threat Defense (MTD) is necessary to defend enterprises in today’s threat environment. Learn first-hand about details of mobile device attacks that lure employees in with fake Pokemon Go apps. We will also discuss zero day attacks such as the recent Pegasus attack that used zero-day technologies to completely compromise mobile security and spy on all communications and data.
In between scrum meetings, user stories and ever shortening sprints, have you penciled in load testing? How do you detect performance degradation and shorten time spent finding and fixing problems in production? Join us and learn how StormRunner can help you deliver high quality projects faster and make load testing a natural fit into your agile development. Your admission also secures you a live demo of the product.