Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Automated Hybrid DDoS Defense Protects Against Sophisticated Attacks Gary Sockrider – Director, Security Product Marketing, NETSCOUT The latest NETSCOUT Threat Intelligence Report reveals 9.7 million DDoS attacks. But that is only the beginning. Attackers are more sophisticated in... 1 day ago | 38 mins Live Demo: Proofpoint CASB Adaptive Access Controls Bo Mendenhall, Cloud Security Solutions Architect from Proofpoint Proofpoint Cloud App Security Broker(CASB) is a people-centric cloud security platform that helps defend your data in the cloud with adaptive access c... 2 years ago | 38 mins DDoS Attacks in 2020 & Best Practices in Defense Tom Bienkowski, Director Product Marketing and Richard Hummel, Manager Threat Intelligence The years not even over yet, but there’s little doubt 2020 will be a year for the history books. Amid the COVID-19 pandemic, cybersecurity teams galla... 2 years ago | 45 mins Integrating DDS Into the AUTOSAR Adaptive Platform Fernando Garcia, Principal Software Engineer at RTI and Emilio Guijarro Automotive Applications Engineer at RTI The AUTOSAR Consortium has recently adopted Data Distribution ServiceTM (DDS) as a connectivity standard for its next-generation Adaptive Platform. In... 2 years ago | 59 mins Why HEAT attacks mark the next era of the cyber threat landscape Eric Schwake, Menlo Security & John Grady, Senior Analyst at ESG Enterprises today are more complex than ever. Data and applications increasingly reside in the cloud, and the users accessing them often do so remotel... 4 months ago | 60 mins Lure & Deceive: Using Deception Technology to Defeat your Adversary Allan Thomson, LookingGlass, CTO; Chris Dahlheimer, LookingGlass, Aeonik Product Owner, Sahir Hidayatullah, Smokescreen, CEO LookingGlass Cyber and Smokescreen invite security teams who have already invested in deception technology to improve its effectiveness in deceiving a... 2 years ago | 52 mins Cornerstones to Fortify Your Enterprise Cybersecurity Defense Panelists: Dr. Anton Chuvakin, Google Cloud; with Sumedh Thakar, Qualys; Roger Grimes, KnowBe4; and Vivian Tero, Illumio. The enterprise cybersecurity landscape is dramatically expanding in scale and complexity, and cyberattacks are growing in magnitude and impact as digi... 2 years ago | 77 mins Defending Against Large-Scale Mobile Banking Malware Greg Hancell, Ben Balthazar & Stefaan Seys, OneSpan Financial institutions have a complex challenge to defend against malicious apps like the Anubis malware, which recently reappeared. Anubis targets t... 2 months ago | 52 mins Why upgrade your MFA to Adaptive Authentication? Isura Karunaratne Associate Technical Lead & Nilasini Thirunavukkarasu Software Engineer, WSO2 In the past, the concept of username and password was sufficient to authenticate a user. With the growth of online businesses, users and the increased... 3 years ago | 45 mins Personalizing Secure Coding Training at Scale Jared Ablon, CEO, HackEDU How adaptive application security training programs, tailored to teams or individual developers, can be created automatically, and at scale. The secre... 5 months ago | 27 mins Load more