Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Ransomware groups negotiation tactics: what you need to know Marc Rivero, senior security researcher, Global Research and Analysis Team, Kaspersky Cybercriminals tend to be secretive and act without disclosing their identity. However, when it comes to ransomware negotiations, the victim and the a... 5 days ago | 39 mins Transforming cyber incident recovery with Veeam and Kyndryl Christophe Bertrand, Enterprise Strategy Group; John Greenough, Kyndryl; Jeff Reichard, Veeam Cyber Resilience should be top of mind for every business in this digital age. No matter the genesis of an incident, the ability to recover rapidly fr... 1 week ago | 37 mins Threat Intelligence in Action Lee Rendell - Senior Presales Manager at Kaspersky UK Access to independent, current, globally sourced cyber threat intelligence at no charge. We anticipate that the current conflict will lead to a grow... 3 weeks ago | 49 mins How to Easily Implement Defense-in-Depth for Cloud Storage Drew Schlussel; Sr. Director, Technical Product Marketing; Wasabi Technologies “Defense-in-Depth" defined by NIST as “An information security strategy that integrates people, technology, and operations capabilities to establish v... October 24, 2023 3:00pm Crisis & Escalation of the Threat Landscape Pascal Geenenes & Daniel Smith Cybersecurity threats continue to evolve and become more sophisticated with a focus on ransomware, targeting of cloud infrastructure and social engine... 5 months ago | 81 mins Recession Proof Your Business – Unlocking E-Rate Dollars & Opportunities Michelle Ragusa-McBain and Loren Wiege of SonicWall; Holly Davis, Komplement Consulting; Ken Fletcher, QTI. Education Rate, more commonly known as E-Rate, is a Federal program that provides schools, libraries, and consortia funding. The E-rate program provi... 1 day ago | 50 mins The Cost of a Breach [NA] Jeffrey Gardner - Practice Advisor, Rapid7 We know the risks to attackers successfully deploying ransomware into a customers environment - offline time, loss of revenue, customer trust, actual ... 2 days ago | 30 mins Findings from the Rapid7 Mid-Year Threat Review [EMEA] Caitlin Condon, Senior Manager, Software Engineering & Christiaan Beek Senior Director, Threat Analytics at Rapid7 The first half of 2023 has been a prolific period for attacker activity, particularly in the ransomware and extortion space. In Rapid7’s Mid-Year Thre... 3 days ago | 28 mins Making Zero Trust Possible with a Security Service Edge (SSE) Approach John Spiegel, Director of Network Transformation, Axis; Jaye Tillson, Director of Strategy, Axis; Sharon Pole, Moderator The security winds are rapidly shifting from "trust but verify" models to ones that assume that every activity is insecure until proven otherwise. In ... 4 days ago | 62 mins Bypassing With Bots: How Adversaries Use Automated Services to Sidestep OTPs Intel 471 Not all passwords are created equal. They may range from silly to scure, but one thing they have in common is that they’re the gateway into sensitive ... October 5, 2023 2:00pm Load more