Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How AI-Powered IOAs and Behavioral ML Detect Advanced Threats at Runtime [NAM] Joel Spurlock (Sr. Director, Malware Research), Joe Faulhaber (Principal Engineer, CrowdStrike) Many organizations today use machine learning (ML) for malware classification and static file analysis. While this can be useful for detecting and res... 2 weeks ago | 17 mins Three Emerging Threat Trends and Best Practices to Mitigate Them Oliver Rochford, Applied Research Director & Security Evangelist, Securonix The cyber threat landscape continues to evolve at a breakneck pace, with more and more cyber-attacks leveraging living-off-the-land, fileless, and oth... 4 months ago | 33 mins Stopping Fileless Attacks with BlackBerry Cylance Brian Robison, BlackBerry Cylance Chief Evangelist Take a closer look on how to protect your organization from the various types of fileless attacks. These threats require a stronger response than trad... 3 years ago | 57 mins Beyond AV: Adding Protection for Fileless Techniques Tony Bailey, Director of Product Marketing, and John Pirc, Director, Product Management Over 90% of breaches begin with a compromise initiated by an end user. And, IT teams spend significant time chasing false positives and negatives with... 3 years ago | 33 mins Get Deep and Dirty on Fileless Attacks and How to Avoid Them Rui Maximo, Director of Solutions Engineering & Archis Gore, CTO Join us for a technical deep dive on: - What is a Fileless Attack and why is it so dirty? - How exploits circumvent common countermeasures - DEMO 1: ... 2 years ago | 76 mins How to Detect Fileless Attacks with Host-Based IDS in USM Anywhere Danielle Russell, Group Product Marketing Manager; Aaron Genereaux, Sr. Sales Engineer Attackers have figured out how to bypass traditional antivirus software with fileless attacks designed to hide within sanctioned applications and even... 3 years ago | 55 mins Under the Hood: Live Demo on Preventing Fileless Attacks Brian Black & Stephen Salinas Fileless attacks are some of the most misunderstood attack vectors in the cyberthreat landscape. With so many different criteria of what actually make... 3 years ago | 31 mins Why should fileless attacks on Linux keep you up at night? Rui Maximo, Director of Solutions Engineering Learn more about fileless attacks and why they are a major threat to your system security 2 years ago | 23 mins Your Hidden Adversary: Understanding and Responding to Fileless Attacks Scott Hardie, Principal Solutions Engineer, ATP, Symantec & David Berman, Sr. Mgr, Product Marketing, ATP, Symantec Attackers are increasingly using stealthy attacks that exploit common tools and techniques that reside in memory and never touch the disk. This web... 5 years ago | 55 mins Fileless attack countermeasures and how they’re broken Rui Maximo, Director of Solutions Engineering & Archis Gore, CTO Learn more about: •What is a Fileless Attack and why is it so dirty? •What are some common counter measures, and why don’t they work? •DEMO 1: NGINX ... 2 years ago | 34 mins Load more