Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Defend against Microsoft Cloud Account Takeovers Curtis Wray and Sai Chavali, Proofpoint More than two-thirds of organizations are fighting cloud account takeovers in their environments. And practically everybody is facing credential compr... 2 months ago | 32 mins CTI Insights: Q4 2022 Cyberthreats Landscape – What have we seen? BlackBerry Threat Research Team Malware is a vehicle to fulfill goals and should not be considered solely malicious code. Based on BlackBerry Cylance telemetry and our in-house cyber... 10 hours ago | 40 mins AI vs Ransomware: Before, During and After Zach Atya, Director of Insurance at Measured Insurance | Adam Mansour, Chief Security Officer at ActZero Join cybersecurity experts from two AI-powered organizations, Adam Mansour of ActZero.ai and Zach Atya of Measured Insurance, as they discuss the impl... 1 day ago | 60 mins Patrones de las amenazas y ataques a dispositivos móviles en España Marcos Regidor | Director of Solution Engineering, Zimperium No importa el sistema operativo o la propiedad del dispositivo, la superficie de ataque a un dispositivo móvil está bajo ataque cada vez más. Desde at... 2 days ago | 43 mins How to effectively detect, prevent & respond to threats with threat intelligence Artem Karasev, Product Marketing Lead; Nikita Nazarov, Malware Analyst Team Lead; Vladimir Kuskov, Head of Threat Exploration The threat landscape is changing rapidly. It’s becoming incredibly challenging to effectively respond to emerging complex and advanced cyberthreats wi... January 31, 2023 5:00am SANS Anatomy of a Ransomware Operation Jake Williams, SANS | Ryan Chapman, BlackBerry Ransomware attacks are no longer “drive-by” events. Encryption is only one of the problems among a list of others that include operational disruption ... January 31, 2023 4:00pm Top Mistakes You Could be Making in Email Security Alyn Hockey Email threats are constant and remain a highly sought-after opportunity for data theft. Oftentimes organizations research email best practices and inc... 1 day ago | 31 mins EDR vs. XDR vs. Managed XDR: Which Makes Sense for You? Patrick Slattery, Global Director of Managed Detection and Response (MDR) Services at BlackBerry What is the difference between endpoint detection and response (EDR), extended detection and response (XDR), and managed XDR (MXDR)? And which approac... February 7, 2023 4:00pm XDR – Where Do I Start? Focus On Security Outcomes Not Technology Nathan Jenniges, Vice President, Strategy & Product Management, BlackBerry XDR technology claims are rampant. Many fail to deliver on expectations. CylanceGUARD® delivers the security promise of XDR by blending people and tec... 3 days ago | 17 mins Evolving Risks: Combating Ransomware’s Latest Threats Michael Kennedy, FedInsider | Mike Rider, Menlo Security Ransomware continues to be one of the single biggest threats to government networks, and IT professionals are increasingly worried about employees who... January 31, 2023 4:00pm Load more