Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cyber Notes Cast - Lessons learned from the Uber data breach senhasegura Uber employees last month discovered a hacker intrusion into their internal network. This was possible because the attacker announced his feat on the ... 2 weeks ago | 8 mins Incident Response War Stories: When MDR Would Have Made the Difference Jeff Gardner, Practice Advisor, Rapid7 | Erick Galinkin, Principle AI Researcher, Rapid7 | Bill Brenner, VP Content, CRA The Managed Detection and Response (MDR) market is heating up as lean security teams lacking the human and financial resources of larger organizations... 1 week ago | 53 mins 2023 DBIR Presents Episode 1:System Intrusion Verizon The Verizon 2023 Data Breach Investigations Report (DBIR) examines confirmed breaches and sheds light on how the most common forms of cyber attacks af... July 13, 2023 2:00pm Toward Real-time Intrusion Detection In Cyber Networks Lekha Patel | Senior Computational Statistician (Sandia National Laboratories) Real-time intrusion characterization in cyber networks is a highly complex problem that requires network-informed anomaly detection tools for success.... 3 months ago | 47 mins Incident Response War Stories: When MDR Would Have Made the Difference Jeff Gardner, Practice Advisor, Rapid7 | Erick Galinkin, Principle AI Researcher, Rapid7 | Bill Brenner, VP Content, CRA The Managed Detection and Response (MDR) market is heating up as lean security teams lacking the human and financial resources of larger organizations... June 21, 2023 6:00pm Stop Network Intrusion Attacks with BIG-IP SSL Orchestrator and IPS Jay Kelley, Sr. Manager, Product Marketing , F5 | Kevin Gallagher, Product Manager Engineer, F5 With the immense volume of transport layer security (TLS) traffic on the internet, application layer security solutions don’t make a lot of sense with... 6 months ago | 34 mins Cyber Notes Cast - Password Reuse Understand the Risks of this Practice senhasegura Password reuse is one of the main reasons why passwords have been questioned as an effective measure to guarantee protection against intrusion into ac... 3 weeks ago | 11 mins Taking Control: Securing Unmanaged Endpoints with Crowdstrike and Talon Dave Gruber, ESG | Justin Kapahi, Talon | Josh Lang, Crowdstrike Organizations like yours rely on third parties more than ever. These third parties often work from unmanaged endpoints, which introduces remarkable cy... June 29, 2023 3:00pm The Tell-tale Signs of a Network Compromise: A Stage-by-Stage Attack Chronology Chad Skipper The average dwell time of a network intrusion lasts an average of 197 days before discovery, according to a Ponemon Institute study. During that windo... 8 months ago | 44 mins SASE- A new way to think about security and networking Keith O'Brien (Palo Alto Networks), Yogesh Ranade (Palo Alto Networks), Beth Cohen (Verizon), David Grady (Verizon) Secure access service edge (SASE) seems to be on everybody's mind these days. And why not? With all of the new security threats and the potential for ... 1 year ago | 42 mins Load more