Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Discover and Remediate Domain Credential Exposures Rinat Villeval Phishing attacks are proving to be the most successful attack method of 2022. And the one thing they all have in common is leveraging abused Domain Cr... 1 week ago | 25 mins What BAS Vendors won’t tell you about BAS Menachem Shafran VP Product, XM Cyber Building a resilient cybersecurity infrastructure with multiple security controls leaves organizations exposed and vulnerable with inherent security g... April 18, 2023 1:00pm Next Gen DevSecOps: The Criticality of Software Supply Chain Security in SDLC Eric Tice, Director Global Open Source Technical Consulting and COE, Wipro Limited Over the last year a lot has happened in the world. COVID, although central and heavily impacting all of our lives in one way or another, is unfortu... 5 months ago | 120 mins Ransomware prevention: Understand today’s attack anatomy & evolution Andrew Pearson: Principal Security Engineer, Clint Harris, Principal Architect 2, Geoff Mefford, Cybersecurity Consultant 3 Ransomware is one of the biggest threats for organizations nowadays. The expectation is that this threat will grow even further. That is because ranso... 2 months ago | 57 mins Webinar: Risk & Compliance Management with Tanium Julia Grunewald, Director, PM, Tanium and Payal Mehrotra, Senior Director, Product Management, Tanium Join this webinar to learn how Tanium can help you achieve and maintain a comprehensive view of risk across your environment as well as the tools nece... 4 months ago | 32 mins Ask me Anything about Ransomware Menachem Shafran | Zur Ulianizky | Paul Giorgi | Shay Siksik Ransomware groups are looking for ways to reach your critical assets, to increase their chances of getting a higher ransom payout. For the same reason... 4 months ago | 44 mins Discover and Remediate Domain Credential Exposures Rinat Villeval Phishing attacks are proving to be the most successful attack method of 2022. And the one thing they all have in common is leveraging abused Domain Cr... 2 months ago | 25 mins Prevent cyber attacks in Azure before they happen Zur Ulianizky Head of Security Research at XM Cyber Misconfigurations within Azure environments are more common than you think. It’s important to learn and understand how attackers can exploit these mis... 3 months ago | 25 mins XM Cyber Presents: A Cloud Security Masterclass Part 2 Paul Giorgi, Director Of Sales Engineering Part 2: Reaching for the Cloud: Inside the Mind of an Attacker With 90% of enterprises leveraging multi-clouds by 2022, it is an absolute field day f... 4 months ago | 46 mins Xm Cyber Presents: A Cloud Security Masterclass Part 3 Paul Giorgi, Director Of Sales Engineering Part 3 - Best Practices to Improve Your Cloud Security Posture Chances are, you are using the cloud or right on your way. It is critical to have a co... 8 months ago | 57 mins Load more