Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Red Teaming Series – EP2 – Red Button, The DDoS Experts Pascal Geenens, Radware | Daniel Smith, Radware | Ziv Gadot, Red Button | Ziv Elyashiv, Red Button In a threat landscape where denial of service is omnipresent, and anyone can become a target, organizations should take a proactive approach to DDoS d... March 22, 2023 8:00am Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 4 days ago | 37 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 4 days ago | 38 mins Crisis & Escalation of the Threat Landscape Pascal Geenenes & Daniel Smith Cybersecurity threats continue to evolve and become more sophisticated with a focus on ransomware, targeting of cloud infrastructure and social engine... 3 weeks ago | 81 mins Crisis & Escalation of the Threat Landscape Pascal Geenenes & Daniel Smith Cybersecurity threats continue to evolve and become more sophisticated with a focus on ransomware, targeting of cloud infrastructure and social engine... 3 weeks ago | 81 mins Automotive Cybersecurity: Device Tamper Protection & Secure Over-the-air Updates Priyank Kumar, Senior Director IoT and Payments Utimaco | Alois Kliner VP Automotive and IoT Manufacturing Utimaco Security risks do not commence when the production of the automobile is finalized; they begin at the point of manufacture, where individual components... 3 months ago | 61 mins How to Protect Against Advanced Email Threats Cary Hudgins, Michael Jones & Alyn Hockey at Fortra. Organizations need comprehensive solutions to combat sophisticated threats. Your email security solution should include collecting threat intelligence... March 21, 2023 12:00pm Ransomware groups negotiation tactics: what you need to know Marc Rivero, senior security researcher, Global Research and Analysis Team, Kaspersky Cybercriminals tend to be secretive and act without disclosing their identity. However, when it comes to ransomware negotiations, the victim and the a... March 22, 2023 2:00pm Trojan Global Equity Strategy Webinar Gabrielle Boyle & George Viney Gabrielle Boyle and George Viney co-managers of the Trojan Global Equity Fund give an update on the process and recent performance of the fund, as wel... 5 days ago | 49 mins Protect Your APIs: Invest in Securing Your Digital Innovation Cheryl Chiodi, Akamai | Abigail Ojeda, Akamai | Akhil Jayaprakash, Akamai | Christine Ross, Akamai APIs make up the fabric of the financial services industry - they bridge the customer to the product. However, according to recent research by Akama... March 24, 2023 5:00am Load more