Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date SANS Anatomy of a Ransomware Operation Jake Williams, SANS | Ryan Chapman, BlackBerry Ransomware attacks are no longer “drive-by” events. Encryption is only one of the problems among a list of others that include operational disruption ... January 31, 2023 4:00pm How to Use GitHub and Static Analysis in Your CI/CD Pipeline Ricardo Camacho - Dir. Regulatory Software Safety & Security Compliance A collaborative culture within organizations has been proven to streamline the product development process. It places value on effective communication... 4 days ago | 26 mins XDR – Where Do I Start? Focus On Security Outcomes Not Technology Nathan Jenniges, Vice President, Strategy & Product Management, BlackBerry XDR technology claims are rampant. Many fail to deliver on expectations. CylanceGUARD® delivers the security promise of XDR by blending people and tec... 6 days ago | 17 mins Business intelligence: Why embedded analytics is the next step Byron Allen, AI & ML Practice Lead at Contino and Simon Darr, Principal Consultant at Contino Standard business intelligence (BI) falls short in some critical areas, namely poor UX which causes friction when users are trying to garner insights.... February 7, 2023 11:00am Securely Replicate PI System Data Across Segmented Networks Dennis Lanahan, Vice President for Commercial Markets, Owl Cyber Defense Many critical infrastructure organizations have a PI system within their OT network to monitor real time asset values and archived/historical data. Th... 3 days ago | 46 mins Understanding Endpoint Security Market and Customer Trends Paddy Harrington, Forrester Senior Analyst | Nathan Jenniges, BlackBerry Vice President, Strategy & Product Management BlackBerry recently commissioned Forrester Consulting to conduct a Total Economic ImpactTM Study of CylancePROTECT®. In this session, we focus on key ... February 14, 2023 5:00pm EDR vs. XDR vs. Managed XDR: Which Makes Sense for You? Patrick Slattery, Global Director of Managed Detection and Response (MDR) Services at BlackBerry What is the difference between endpoint detection and response (EDR), extended detection and response (XDR), and managed XDR (MXDR)? And which approac... February 7, 2023 4:00pm CTI Insights: Q4 2022 Cyberthreats Landscape – What have we seen? BlackBerry Threat Research Team Malware is a vehicle to fulfill goals and should not be considered solely malicious code. Based on BlackBerry Cylance telemetry and our in-house cyber... 3 days ago | 40 mins PKI Meets Red Team: Revealing Common Microsoft AD CS Misconfigurations Ted Shorter, CTO, Chris Hickman, CSO, Lee Christensen, Technical Architect, & Will Schroeder, Technical Architect Microsoft Active Directory (AD) PKI is widely used by enterprises today, yet it has largely flown under the radar of attackers and defenders – until n... 5 days ago | 46 mins Back to the Future: What Will Endpoint IR Really Look Like? Greg Scheidel, SANS | Robert Fink, BlackBerry Let’s go back, way back to 2013 when AV was AV, whitelisting was whitelisting, and EDR ads were taking over airport terminals. Ah, the good old days. ... February 7, 2023 5:00pm Load more