Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Automating Malware Investigation & Response Shravanthi Reddy, Sr. Product Marketing Manager; Brian Miller, Director Product Mgmt; Nicholas Ericksen, Solutions Architect The damage caused by malware is well known, so limiting that damage is always a top priority for cybersecurity teams. Unfortunately, manually investig... June 16, 2023 3:30am M-Trends 2023 : サイバー攻撃と防御の最前線から Mandiant プロフェッショナル・サービス プリンシパル・コンサルタント 杉山 貴裕 M-Trends 2023レポートは、Mandiantが実際に従事したインシデント・レスポンス調査や、他と一線を画す広さと深さを誇る脅威インテリジェンスなど、サイバー攻撃と防御の最前線からのタイムリーなデータを軸に今日の脅威動向を解説する年次レポートです。 本Webセミナーでは、Mandiantの... June 14, 2023 7:00am Today's Top Cyber Developments and Attacks : M-Trends 2023 APAC Views Yihao Lim, Lead Threat Intelligence Advisor, JAPAC The M-Trends 2023 report is packed with timely data from Mandiant’s frontline incident response investigations and unparalleled threat intelligence, o... 2 weeks ago | 37 mins By the Numbers of Today's Top Cyber Developments and Attacks: M-Trends 2023 Kirstie Failey, Senior Threat Analyst, Mandiant; Jake Nicastro, Principal Threat Analyst, Mandiant The M-Trends 2023 report is packed with timely data from Mandiant’s frontline incident response investigations and unparalleled threat intelligence, o... 2 weeks ago | 55 mins Cyber Threat Brief - Insights into today’s top cyber security trends and attacks Alirezah Arasteh - Head of Mandiant Consulting, Canada The M-Trends 2023 report is packed with timely data from Mandiant’s frontline incident response investigations and unparalleled threat intelligence, o... June 21, 2023 6:00pm Detecting & Restricting Lateral Movement in Multi-Cloud Environments Chad Skipper, Global Security Technologist VMware If you can’t see it, you can’t protect it. Considering 44% of breaches perform some sort of lateral movement, that’s a lesson you don’t want to learn ... 1 month ago | 51 mins Understanding and Defending Against the Ransomware Threat Chris Yule - Director, Threat Research, Secureworks Network defenders often look at "dwell time" – the time between an adversary gaining access and achieving their objectives – as a key metric in unders... 2 months ago | 31 mins Reducing Dwell Time – Mandiant Managed Defense Steve Ledzian - VP, CTO - APJ The problem is not that organizations get breached, the problem is that organizations get breached and don’t notice. Reducing dwell time is key to be... 7 months ago | 51 mins How Attackers Increase Their Dwell Time and How To Detect Them Members of our Insikt Group (Lindsay Kaye, Greg Lesnewich, Patrick Barry), Recorded Future In part two of the Attack Life Cycle Webinar Series: How Attackers Increase Their Dwell Time and How To Detect Them, members of our Insikt Group (Lind... 1 year ago | 61 mins [EMEA] Racing Against Ransomware: Hacker’s perspective & how to lower dwell time Paula Januszkiewicz, Founder and CEO of CQURE and Leonardo Hutabarat, LogRhythm APAC Sales Engineering Manager Ransomware attacks are on the rise. Concurrently, cybercriminals are also innovating their attacks to ensure payment from victims, deploying triple ex... 1 year ago | 35 mins Load more