Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Addressing the Challenges of Transactional Email with Secure Email Relay Craig Temple, Senior Product Marketing Manager and Alex Fryback, Product Manager Not all business emails are generated by people; in fact, most emails are transactional, generated by applications. Securing these messages, especiall... 4 months ago | 31 mins Mobile Threat Landscape [EMEA] David Williams (Senior Engineer), Connor Brant (iOS Researcher), Gabriel Cirlig (Lead Android Researcher) Mobile devices are now our primary access point for communications, finances, and our social lives –because of this, cybercriminals are increasingly f... 3 months ago | 71 mins How to effectively detect, prevent & respond to threats with threat intelligence Artem Karasev, Product Marketing Lead; Nikita Nazarov, Malware Analyst Team Lead; Vladimir Kuskov, Head of Threat Exploration The threat landscape is changing rapidly. It’s becoming incredibly challenging to effectively respond to emerging complex and advanced cyberthreats wi... January 31, 2023 5:00am Advanced persistent threat predictions for 2023 David Emm, Pierre Delcher, Global Research and Analysis Team, Kaspersky The political turmoil of 2022 brought about a shift that will resonate in cybersecurity for years to come and have a direct impact on the development ... January 31, 2023 2:00pm Ransomware Preparedness Before, During and After Andrew Miller, Principal Technologist, Pure Storage and Michelle Drolet, CEO, Towerwall Ransomware is by no means a new topic, but is relevant nonetheless, due to the continued prevalence with which bad actors engage in ransomware campaig... 2 weeks ago | 25 mins Improving Electric Grid Cybersecurity with Cyber-Physical Analysis Shamina Hossain-McKenzie (Sandia National Laboratories) Cyber attacks are rising against critical infrastructure systems and have serious implications for our national security. In addition, many interconne... January 31, 2023 7:00pm Top Mistakes You Could be Making in Email Security Alyn Hockey Email threats are constant and remain a highly sought-after opportunity for data theft. Oftentimes organizations research email best practices and inc... 4 days ago | 31 mins How AI-Powered IOAs and Behavioral ML Detect Advanced Threats at Runtime [NAM] Joel Spurlock (Sr. Director, Malware Research), Joe Faulhaber (Principal Engineer, CrowdStrike) Many organizations today use machine learning (ML) for malware classification and static file analysis. While this can be useful for detecting and res... 3 weeks ago | 17 mins Symbiote 101: How to Secure Users Against this Advanced Linux Malware Dmitry Bestuzhev, Most Distinguished Threat Researcher | BlackBerry A few months ago, in a joint collaboration with Intezer, we discovered a new, previously undetected malware that acts in a parasitic nature and affect... 1 month ago | 30 mins Simplifying DMARC Email Authentication with Agari Brand Protection Brent Sleeper, Sr Product Manager at Agari & Mike Olsen, Channel Sales Engineer at Agari. In this webinar, discover how Agari Brand Protection automates and simplifies DMARC email authentication so you can get to policy=reject faster. You ... 6 days ago | 27 mins Load more