Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cyber fraud in 2022: current threats and prevention techniques Ekaterina Danilova, Business Development Manager, Kaspersky Fraud Prevention In 2021, while life began to return to normal, fraudsters and cyber-criminals continued to keep their fingers on the pulse, adjusting their schemes to... July 5, 2022 5:00am Biggest Cybersecurity Challenges of 2022: Are You Prepared? Lisa Forte - Cybersecurity, David Warburton - Threat Research Manager, F5 and Matthieu Dierick - Solutions Architect, F5 Join us for an exclusive myForum event where we explore and debate the most pressing cybersecurity concerns of 2022, and more importantly how organisa... July 5, 2022 9:00am Protecting Against Endpoint To Cloud Attack Chains [EMEA] Doug Cahill (Vice President, Analyst Services & Senior Analyst), David Puzas (Sr. Product Marketing Manager, Cloud Security) Maintaining security consistency across our own data center and public cloud environments, along with the use of multiple cybersecurity controls are m... July 5, 2022 9:00am Security Master Chef: A Visibility and Response Recipe for Any Cloud Environment Joshua Cowling - Consulting Sales Engineer at Splunk Angelo Brancato - Executive Cyber Security Advisor at Splunk Organizations are adopting cloud services at a rapid speed, and security incidents are spanning across on-premises, multi-cloud platforms, and many un... July 5, 2022 12:00pm Human Factor Report 2022: 5 myths of Social Engineering Andy Rose, Resident CISO, Proofpoint; and Jenny Radcliffe, Cybersecurity Consultant, The Human Factor Have you heard of the new breed of “Friendly” fraudsters? Trust is an essential component of social engineering. To persuade someone to interact with ... July 5, 2022 9:00am MITRE ATT&CK Framework: Seeing Through the Eyes of Your Attacker Davide Veneziano Senior SE, Antonio Forzieri Cybersecurity Specialist & Matthias Maier EMEA Director of Product Marketing Start thinking like an attacker and learn how to make more effective decisions to prevent costly attacks – before your business is interrupted. It’s ... July 7, 2022 12:00pm Leveraging Threat Intelligence in Your Organisation Melinda Marks, Senior Analyst, ESG | Jason Steer, Chief Information Security Officer, Recorded Future The primary objective of threat intelligence is to show organisations the many risks they face from external threats. But what are the types of threat... 2 weeks ago | 24 mins Cutting through the Fog of More: Use MDR or XDR to Find Real Threats John Bruggeman, virtual CISO, CBTS Endpoint protection alone used to be good enough for companies. But now we have too many alerts, from too many systems along with “the Fog of More” ma... July 19, 2022 12:00pm Threats in 3 Minutes - Apache Log4j Vulnerability (Explained) Shehnaaz, Product Expert Logging is a fundamental feature of software. A flaw in Log4j, a Java-based logging utility, has been deemed as one of the most high-profile security ... 13 hours ago | 3 mins A Deep-Dive on Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat Dmitry Bestuzhev, Most Distinguished Threat Researcher | BlackBerry A few months ago, in a joint collaboration with Intezer, we discovered a new, previously undetected malware that acts in a parasitic nature and affect... July 7, 2022 4:00pm Load more