Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Protect Against Modern Active Directory Attacks Patrick Doherty (Vice President Sales Identity Protection), Matthew McDermott (Sales Engineer) The adversary has evolved. 80% of modern attacks are identity-driven and Active Directory (AD) is often considered the weakest link in an organization... February 28, 2023 10:00am 5 KEY CONSIDERATIONS BEFORE INVESTING IN AN EXTERNAL ATTACK SURFACE MANAGEMENT Tina Thorstenson, VP, Industry Business Unit & Executive Strategist and Kamil Imtiaz, Director, Product Marketing, IT SecOps It’s no secret: your external attack surface is expanding. Digital transformation, remote work, cloud migration and increased reliance on third party ... February 21, 2023 10:00am Defending Against Ransomware With CrowdStrike And ServiceNow Jason Rivera, CrowdStrike; Alex Cox, ServiceNow; Jonathon Brown, TechTarget Ransomware is one of the most serious cybersecurity threats facing organizations today. The past few years have seen a rise in such attacks and in the... 1 month ago | 47 mins Protect Against Modern Active Directory Attacks [EMEA] Patrick Doherty (Vice President Sales Identity Protection), Matthew McDermott (Sales Engineer) The adversary has evolved. 80% of modern attacks are identity-driven and Active Directory (AD) is often considered the weakest link in an organization... 2 months ago | 60 mins Holiday Cyber Attacks [EMEA] Christian Heggen (Strategic Threat Advisor) The festive season presents numerous new highs of business amongst retail entities and consumers which also means a huge amplification of opportunitie... 2 months ago | 48 mins Mobile Threat Landscape [EMEA] David Williams (Senior Engineer), Connor Brant (iOS Researcher), Gabriel Cirlig (Lead Android Researcher) Mobile devices are now our primary access point for communications, finances, and our social lives –because of this, cybercriminals are increasingly f... 3 months ago | 71 mins MITRE ATT&CK Framework: Seeing Through the Eyes of Your Attacker Davide Veneziano, Antonio Forzieri, Matthias Maier Start thinking like an attacker and learn how to make more effective decisions to prevent costly attacks – before your business is interrupted. It’s ... 2 months ago | 60 mins Combating the Rise in Threats to Cloud Environments [EMEA] David Puzas, Scott Fanning, Joshua Shapiro (CrowdStrike) As organizations migrate more services and applications to the cloud, adversaries have shifted their focus to exploit a broader attack surface. From ... 5 months ago | 60 mins Race Against Time: What to do when a zero-day attack strikes Jason Spindlow, Systems Engineer Specialist for Cortex Three words are often associated with a zero-day attack – vulnerability, exploit and attack. Given that no software patch exists for a zero-day vul... 1 day ago | 58 mins How Corelight Transforms Data Security with Normalyze Bernard Brantley (CISO @ Corelight), Amer Deeba (CEO & Cofounder @ Normalyze) When organizations need to know not only what type of malicious activity potentially occurred within their networks and clouds but also gather the rem... 2 days ago | 51 mins Load more