Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Combating the Rise in Threats to Cloud Environments [EMEA] David Puzas, Scott Fanning, Joshua Shapiro (CrowdStrike) As organizations migrate more services and applications to the cloud, adversaries have shifted their focus to exploit a broader attack surface. From ... 5 months ago | 60 mins PKI Meets Red Team: Revealing Common Microsoft AD CS Misconfigurations Ted Shorter, CTO, Chris Hickman, CSO, Lee Christensen, Technical Architect, & Will Schroeder, Technical Architect Microsoft Active Directory (AD) PKI is widely used by enterprises today, yet it has largely flown under the radar of attackers and defenders – until n... 3 days ago | 46 mins Credential Access and Impacts Down Range Daniel Smith – Head of Research (CTI) Radware | Dov Lerner – Security Research Lead Cybersixgill If you want to learn more about the digital underground economy related to credential access, join Radware and Cybersixgill for a special webinar wher... 1 month ago | 25 mins Credential Access and Impacts Down Range Daniel Smith – Head of Research (CTI) Radware | Dov Lerner – Security Research Lead Cybersixgill If you want to learn more about the digital underground economy related to credential access, join Radware and Cybersixgill for a special webinar wher... 1 month ago | 25 mins Digital Signature Solutions: Streamline & Secure Document Signing Workflows Raj B., Field CISO at Oracle | Paul Loth, Product Manager at Evidos B.V. Organizations need to adapt to the requirements of today’s digital era, but many have neglected a key digital service: e-signing solutions. In order t... February 16, 2023 4:30pm Off The Record: RedAlpha Conducts Multi-Year Credential Theft Campaign - Part 3 Jon Condra, Director of the Strategic and Persistent Threats team at Recorded Future Part 3 of 3-part series Off The Record: Recorded Future observes Chinese state-sponsored cyber-espionage and surveillance campaigns, likely from Red ... 4 months ago | 45 mins Decentralised Identity: Giving Control Back to the Consumer Diana Kelley - CSO, Cybrize and Guests In an age of the digital footprint, where data is being produced at such a rapid pace that we almost can’t keep up, decentralised identity offers an e... March 15, 2023 5:00pm Digital Signature Solutions: Streamline & Secure Document Signing Workflows Raj B., Field CISO at Oracle | Paul Loth, Product Manager at Evidos B.V. Organizations need to adapt to the requirements of today’s digital era, but many have neglected a key digital service: e-signing solutions. In order t... 2 months ago | 31 mins MFA Fatigue – Fighting a 2-Front War Donovan Blaylock II, Director of Solutions Engineering, SecureAuth With cybercrime on the rise, more organizations are implementing best practices such as multi-factor authentication (MFA) to protect their users from ... 2 months ago | 32 mins Combating the Rise in Threats to Cloud Environments David Puzas (CrowdStrike), Scott Fanning (CrowdStrike), Joshua Shapiro (CrowdStrike) As organizations migrate more services and applications to the cloud, adversaries have shifted their focus to exploit a broader attack surface. From ... 2 months ago | 60 mins Load more