Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How To Apply Threat Hunting Solutions To Find Malware And Avoid Reinfection Marc Craddock, Sales Engineer at Rubrik In the midst of a cyberattack recovery, identifying what systems were first affected by malicious threat actors - and when - can be challenging. Moder... June 21, 2023 9:00am Verizon Threat Research Advisory Center MIB Katie Pierce, Abdul Abufilat, Dave Kennedy Navigating the Digital Frontier with the U.S. Secret Service Join us — the Verizon Threat Research Advisory Center — in this month's pivotal intellig... 2 weeks ago | 67 mins Verizon Threat Research Advisory Center MIB Dave Kennedy Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscap... June 21, 2023 4:00pm Smartly Using Global Threat Intelligence in the Fight Against DDoS Attacks Richard Hummel, Senior Engineering Manager, Security, NETSCOUT Andrew Cockburn, Chief Solutions Architect, Security, NETSCOUT Join this discussion and gain insight on: • The different types of Cyber Threat Intelligence (CTI) and the value they provide to supporting and enhanc... 2 months ago | 55 mins What you need to know about the 3CX Cyber Attack Matt Rose, Field CISO, ReversingLabs & Tomislav Pericin, Co-Founder/Chief Software Architect, ReversingLabs ReversingLabs Co-Founder/Chief Software Architect Tomislav Pericin and Field CISO Matt Rose delve into the details of the explosive software supply ch... 2 months ago | 44 mins Indicators of Compromise in Your APIs Jason Kent, Hacker in Residence at Cequence Security As APIs are being utilized to normalize data transfer from various application endpoints and third-party resources, we have created interconnectivity ... 3 months ago | 37 mins The Next Big Thing In Ransomware Recovery Kev Johnson, Technical Marketing Architect Most organizations invest heavily in protecting their environment from threat actors. But when ransomware takes a business down, 58% of businesses sta... 2 months ago | 54 mins Verizon Threat Research Advisory Center MIB - Mindful CyberSecurity Automation Joseph Silva, Abdul Abufilat and Dave Kennedy Join us—the Verizon Threat Research Advisory Center – to discuss automation, its limits, and how it is often viewed as the panacea for cybersecurity t... 1 month ago | 73 mins Verizon Threat Research Advisory Center MIB Dave Kennedy Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscap... July 19, 2023 4:00pm How Mature Behavior Analytics Accelerates Detection of Persistent Threats Sanjay Raja, VP Product Marketing and Solutions, Gurucul Many solutions that have some threat detection and response capabilities, such as SIEM and XDR, are claiming to add User and Entity Behavior Analytics... 2 months ago | 36 mins Load more