Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date CISO’s Guide to Saving Costs in a Time of Shrinking Resources Ashish Jain, Chief Technology Officer of Arkose Labs and guest speaker, Forrester Principal Analyst Sandy Carielli CISOs face pressure with a wavering economy, double-digit cyberattack increases, and limited resources. How can they protect against ATO, credential s... May 29, 2023 5:00pm Web Beacons: The Secret Weapon Against Phishing Attacks Abhilash Garimella, Head of Research @ Bolster While there are many strategies to combat phishing, there is one strategy that often goes unnoticed—web beacons. A web beacon is a technique used on ... May 30, 2023 5:00pm How BEC Groups Exploit Generative AI to Launch Attacks SlashNext What’s Required to Stop Them? Learn how using Generative AI can proactively anticipate potential BEC threats created using the same AI technology. May 31, 2023 6:00pm Can DNS Security Block Phishing? Paul Mockapetris, Chief Scientist at ThreatSTOP Phishing is a serious threat faced by all businesses and individuals. It may seem as though there is no way to stop phishing scams, but DNS security c... May 30, 2023 5:00pm Top Mistakes You Could be Making in Email Security Alyn Hockey Email threats are constant and remain a highly sought-after opportunity for data theft. Oftentimes organizations research email best practices and inc... 4 days ago | 31 mins How DMARC helps combat domain-spoofing phishing attacks Adam Searcy (Senior Technical Product Marketing Manager), Thorsten Stoeterau (Solutions Architect) Attend this webinar to gain a complete understanding of how DMARC closes the gaps left by other domain-authentication protocols like Sender Policy Fra... 4 days ago | 61 mins Phishy Business - Shining a Light on Bots: The Good and the Bad Cyril Noel-Tagoe, Kiri Addison In this episode of Phishy Business, we take a look at bots. Listen in to learn more about what bots are, and what they do. Also, learn what can make t... May 31, 2023 11:00am Navigating NIS2: Tips and best practices for protecting your business Raynaud Schokkenbroek (Sr. Technical Sales Engineer), Judah van Wees (Webinar Host) NIS2, or the Network and Information Systems Directive, is an EU legislation designed to improve the cybersecurity of businesses in Europe. In this w... May 30, 2023 9:00am How to Keep Sensitive Data Safe and Compliant Nick Hogg, Director of Technical Training at Fortra Keeping data secure is a constant exercise of fighting cyber threats that change daily and maintaining a strong training program for employees to stay... June 1, 2023 9:00am School of Phish: Importance of Three Categories of Protections Part 1: People Ken Dang, Sr. PMM; John Phil, Sr. SA; JT Fanning, Sr. TAM ENHANCE THE HUMAN LAYER OF CYBERSECURITY The first of this six-part series focuses on People and their role in the Importance of Three Categories of ... 4 days ago | 65 mins Load more