Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Leverage Threat-Informed Defense in Your Environment Mike McPhee - Cybersecurity Architect - Cisco Normally agility and innovation are good things. Unfortunately, adversaries have taken these traits to heart, leaving security operations overloaded a... 3 days ago | 46 mins Key Findings from 2022 Data Threat Report – Financial Services Edition Eric Hanselman, Chief Analyst, 451 Research; Marcelo Delima, Global Solutions Marketing Manager, Thales Financial services firms are typically ahead of other industries in cyber defense maturity due to their highly regulated nature. However, advanced sec... 22 hours ago | 42 mins Securing the Supply Chain with Multi-Signal Defense Kill Chain Spence Hutchinson, Principal Threat Researcher In this webinar, Spence Hutchinson, Principal Threat Researcher with eSentire’s Threat Response Unit (TRU), Spence discusses: - The top cyber threats ... 4 days ago | 35 mins Getting a Step Ahead of the Attacker with Vulnerability Scanning & Pen Testing Dan Murphy, Distinguished Architect, Invicti Security A panel discussion that has aired initially as part of the Dark Reading Virtual Event, sponsored by Invicti: Today’s threat landscape calls for a mor... 1 day ago | 49 mins Deep Observability: Critical Solution to Cloud Migration Baseer Balazadeh, Senior Technical Marketing Engineer - Gigamon Originally aired on an ActualTech Media webcast. Securing hybrid and multi-cloud workloads and supporting infrastructures is a daunting challenge for... 3 days ago | 29 mins BEC Defense: Perspectives of a CISO Turned Research Analyst Brian Wrozek, Guest Speaker from Forrester, John Stevenson, Security Product Director at Cyren It’s become cliché that email is the top attack vector and users are the weakest link. What if email was no longer the top attack vector and users wer... February 9, 2023 4:00pm Moving Target Defense for Space Systems Chris Jenkins ( Sandia National Laboratories) Space systems provide many critical functions to the military, federal agencies, and infrastructure networks. Space Policy Directive-5 Cybersecurity P... February 9, 2023 7:00pm Proven defense tactics for amplification DDoS attacks Omer Yoachimik, Product Manager, DDoS Protection Alex Forster, Systems Engineer A new zero-day vulnerability has been discovered that can be exploited to launch disruptive DDoS attacks using UDP amplification. This attack vector i... February 9, 2023 12:00am What Healthcare Organizations Need to Know About #killnet Tony Lauro, Akamai’s Director of Security Strategy As war in Ukraine continues to heat up, the war elsewhere on DDoS attacks intensifies as pro-Russia hacker group Killnet targets U.S. healthcare. But ... 2 days ago | 10 mins What's Next for Email Security as Socially Engineered Attacks Outsmart Defenses? Ram Ganeshanathan, VP of Enterprise Security at ARM and Jason Lang, Team Lead of Targeted Operations at TrustedSec Secure Email Gateways are no match for the increased sophistication of inbound attacks. Join this webinar for an exclusive peek from TrustedSec into ... February 9, 2023 4:00pm Load more