Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Enabling trust and security in crypto with biometrics Su Carpenter of CryptoUK, Alan Goode of Goode Intelligence and Kai Phillips of Facephi The cryptocurrency industry has been undergoing turbulent times lately. On the one hand, the industry has experienced unprecedented levels of fraud an... April 4, 2023 2:00pm Creating Your Own Insider Threat: You are Your Own Worst Enemy Joshua Crumbaugh Every day, thousands of organizations are unknowingly exposing themselves to more insider threats due to inadequate security awareness models. This is... 4 weeks ago | 51 mins Trends in Cyber Threats and Top Countermeasures Peter Osazuwa, Founder/CEO, HyperSecureIT Sàrl Cyber threats continue to increase and are impacting almost all aspects of modern life. Ransomware, malicious domains, espionage and digital disrupti... 11 months ago | 53 mins Cyber Insurance: The Last Line of Defence Against Hackers Stéphane Cardot, Director Presales EMEA, Quantum & Gisa Kimmerle, Head of Cyber, Hiscox Cyber attacks such as ransomware have proliferated through every vertical and industry and continue their upward trajectory trend, costing companies a... 2 months ago | 54 mins Focus on FinTech [Season 2 Ep. 6]: Counter Measures Eric Hazard, CEO, Vested Ventures "ALERT: There has been suspicious activity on your account. Everyone's received one of these messages in their time. Maybe you used your credit card i... 4 years ago | 12 mins How to Prevent Mobile App API Abuse: Attacks and Counter-Measures Skip Hovsmith, Principal Engineer & VP Americas, CriticalBlue Think a good user authentication solution is enough protection? Think again. Follow the ShipFast courier service’s evolving mobile app and API securit... 4 years ago | 56 mins IP Theft: Unraveling Cyber Threat Intelligence Alex Marjanovic, John E. Breen, Ankur Sheth, Philip N. Yannella, Scott Koller, Brent Riley The cross-roads between technology and law are becoming more evident through the unfortunate surge of data breaches, ransomware and data exfiltration ... 5 months ago | 61 mins Taking a Holistic View of Cybercrime: ISF and European commission report Bruce Page, Head of Services, ISF On Thursday 24th February at 13:00 GMT Bruce Page, Head of Service at the ISF, discussed the key findings of a European Commission research report on ... 1 year ago | 54 mins How to Prevent Mobile App API Abuse: Attacks and Counter-Measures Skip Hovsmith, Principal Engineer & VP Americas, CriticalBlue Think a good user authentication solution is enough protection? Think again. Follow the ShipFast courier service’s evolving mobile app and API securit... 4 years ago | 55 mins SANS ATT&CK™ and D3FEND™: Incorporating Frameworks into Your Analysis and Intel Matt Bromiley, Certified SANS Instructor; Tyson Supasatit, Uptycs Product Marketing Manager A panel discussion featuring Matt Matt Bromiley diving into how you can leverage the new MITRE D3FEND Framework geared toward counter attack measures.... 1 year ago | 79 mins Load more