Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The Future of Attacker Automation and AI David Warburton, Director at F5 Labs, the Threat Research Division of F5 and Bryan Glick, Editor in Chief at ComputerWeekly Automation is a growing security problem that most organisations don’t recognise as many have no way of identifying which “users” are real humans and ... June 8, 2023 11:00am Business Email Compromise: How AI Has Changed the Playing Field Dr Rebecca Wynn, Click Solutions Group | Kate Fazzini, CEO, Blue Line Recoveries Business Email Compromise (BEC) is an example of a phishing attack, used to steal money and/or sensitive corporate data. No organisation is immune to ... June 8, 2023 3:00pm The Future of Attacker Automation & AI David Warburton, Director at F5 Labs | Brian McKenna, EMEA Regional Director, Analyst Services, ESG Automation is a growing security problem that most organisations don’t recognise as many have no way of identifying which “users” are real humans and ... June 21, 2023 1:00pm Crisis & Escalation of the Threat Landscape Pascal Geenenes & Daniel Smith Cybersecurity threats continue to evolve and become more sophisticated with a focus on ransomware, targeting of cloud infrastructure and social engine... 1 month ago | 81 mins Crisis & Escalation of the Threat Landscape Pascal Geenenes & Daniel Smith Cybersecurity threats continue to evolve and become more sophisticated with a focus on ransomware, targeting of cloud infrastructure and social engine... 1 month ago | 81 mins Crisis & Escalation of the Threat Landscape Pascal Geenenes & Daniel Smith Cybersecurity threats continue to evolve and become more sophisticated with a focus on ransomware, targeting of cloud infrastructure and social engine... 3 months ago | 81 mins Can We Have it All? How To Prioritise Security Without Hindering Your Workforce Box and Guests Security is a global business priority. The ability to manage valuable and sensitive data while simultaneously reducing financial, legal and reputatio... 1 month ago | 36 mins Crisis & Escalation of the Threat Landscape Pascal Geenenes & Daniel Smith Cybersecurity threats continue to evolve and become more sophisticated with a focus on ransomware, targeting of cloud infrastructure and social engine... 3 months ago | 81 mins Web Beacons: The Secret Weapon Against Phishing Attacks Abhilash Garimella, Head of Research @ Bolster While there are many strategies to combat phishing, there is one strategy that often goes unnoticed—web beacons. A web beacon is a technique used on ... 3 days ago | 41 mins How to Keep Sensitive Data Safe and Compliant Nick Hogg, Director of Technical Training at Fortra Keeping data secure is a constant exercise of fighting cyber threats that change daily and maintaining a strong training program for employees to stay... 20 hours ago | 49 mins Load more