Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Indicators of Compromise in Your APIs Jason Kent, Hacker in Residence at Cequence Security As APIs are being utilized to normalize data transfer from various application endpoints and third-party resources, we have created interconnectivity ... 2 weeks ago | 37 mins How Mature Behavior Analytics Accelerates Detection of Persistent Threats Sanjay Raja, VP Product Marketing and Solutions, Gurucul Many solutions that have some threat detection and response capabilities, such as SIEM and XDR, are claiming to add User and Entity Behavior Analytics... 6 days ago | 36 mins Smartly Using Global Threat Intelligence in the Fight Against DDoS Attacks Richard Hummel, Senior Engineering Manager, Security, NETSCOUT Andrew Cockburn, Chief Solutions Architect, Security, NETSCOUT Join this discussion and gain insight on: • The different types of Cyber Threat Intelligence (CTI) and the value they provide to supporting and enhanc... April 5, 2023 5:00pm The Next Big Thing In Ransomware Recovery Kev Johnson, Technical Marketing Architect Most organizations invest heavily in protecting their environment from threat actors. But when ransomware takes a business down, 58% of businesses sta... April 11, 2023 9:00am ChatGPT - good or evil? AI impact on cybersecurity Vladislav Tushkanov; Maher Yamout; Victor Sergeev, Kaspersky Team As the world discusses ChatGPT-3 and its impressive capabilities, the business community is concerned about the AI’s potential to change the game for ... April 13, 2023 5:00am ChatGPT - good or evil? AI impact on cybersecurity Vladislav Tushkanov, Maher Yamout, Victor Sergeev, Kaspersky As the world discusses ChatGPT-3 and its impressive capabilities, the business community is concerned about the AI’s potential to change the game for ... 1 month ago | 83 mins Extending the Reach of Threat Intelligence: The Need for Collective Defense Neal Dennis - Cyware, Tyler Curry - Health-ISAC In the healthcare industry, it’s more critical than ever to get the right threat intelligence to the right people at the right time. While security te... 1 month ago | 45 mins 2023 Cybersecurity Resolutions for People, Process & Technology SonicWall Experts: JT Fanning, John Phil, Immanuel Chavoya The future success of your cybersecurity programs rests on how well your organization can spot, understand and preemptively act against active vulnera... 2 months ago | 69 mins New (and free) analysis tools for the cyber threat hunter Chris Doman, Tawnya Lancaster, Amy Pace, Michael Vaughn - AT&T Cybersecurity Today’s threat detection systems are highly effective for most attacks however no single system can detect 100 percent of attacks all the time. In res... 5 months ago | 60 mins Start Gathering Your Own Threat Intelligence Dan Brett, CSO & Founder, CounterCraft Traditional threat intel is broken. We’re trained to conduct threat intel analysis based on what the industry has given us: wordy threat intel reports... 5 months ago | 33 mins Load more