Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Malware For Sale: Analyzing Malware-as-a-Service On Dark Web Markets Akanksha Harjai, Solutions Sales Engineer at Cyberint On deep and dark web marketplaces, malware is sold through a subscription model for as little as $50 per month. This has made it much easier for anyon... 1 day ago | 64 mins Sangfor NGAF: Consecutive Top Ratings in CyberRatings Enterprise Firewall Test Steven Tsui - Sangfor NGAF Deputy Operation Manager Sangfor NGAF has again earned the "Recommended" rating in the CyberRatings enterprise firewall test, solidifying its position as one of the industry's... 2 weeks ago | 49 mins Extend Zero Trust with Deception-based Active Defense Amir Moin, Senior Product Manager at Zscaler *This is a replay session* Over the past two years, there has been a significant increase in human-operated threat actors using stealthy tactics, soc... June 28, 2023 5:00pm What Threat Actors Don’t Want You to Know: Active Evasion Techniques Michael Tyler Cybercriminals constantly evolve their tactics to evade detection. This is especially true for phishing campaigns. Threat actors frequently use new te... 2 months ago | 28 mins 2023 Cybersecurity Threat Report: Key Findings & Insights Comcast Business Technology is accelerating faster than ever, giving IT and security teams more tools to fend off cybersecurity attacks from an increasingly diverse sl... June 29, 2023 5:00pm MITRE ATT&CK for Ransomware Evasion CyberArk "How well a given solution aligns with the MITRE ATT&CK framework is a common question for IT and security pros researching ransomware resilient offer... 4 months ago | 50 mins Stop Nation-State Ransomware Brook Chelmo, Director Product Marketing, Fortinet Ransomware is the vehicle of choice for hackers to hone their skills and to also earn a living. This session will cover how advanced attacks contain n... 1 month ago | 22 mins A MythBusting Special — 9 Myths about File-based Threats Vinay Polurouthu, Principal Product Manager & Amy Heng, Product Marketing Manager Bad actors love to deliver threats in files. Persistent and persuasive messages convince unsuspecting victims to accept and open files from unknown so... 1 month ago | 64 mins Novel Cyber Evasion Techniques (Adopting a Novel Zero Trust Model) Valerian Rossigneux, Director of Sales Engineering, Asia No Longer Just the Novel Coronavirus but Novel Cyber Evasion Techniques: Is Your Organisation Ready to Adopt Zero Trust Model? For security teams on ... 7 months ago | 18 mins A MythBusting Special — 9 Myths about File-based Threats Vinay Polurouthu, Principal Product Manager & Amy Heng, Product Marketing Manager Bad actors love to deliver threats in files. Persistent and persuasive messages convince unsuspecting victims to accept and open files from unknown so... 2 months ago | 64 mins Load more