Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Forcepoint RBI: Blocking Steganographic Data Exfiltration Corey Kiesewetter, Sr. Product Marketing Manager, Forcepoint | Anthony Bennis, Sr. Product Manager, Forcepoint With data theft is on the rise. Many organizations deploy defenses such as data loss prevention (DLP) technologies to prevent people from misusing sen... 3 months ago | 13 mins 2021 Human Factor - Why People are Targets Daniel Blackford, Sr. Threat Researcher at Proofpoint Our premier annual report, The Human Factor, is the culmination of a year’s worth of threat research and insights drawn from more than 2.2 billion ema... 1 year ago | 45 mins Steganography + Malware - a Match Made in Hacker Heaven Ira Winkler, Security Evangelist Steganography has been used for centuries to hide a secret message in an otherwise harmless container. Its latest iteration is a malware delivery vehi... 3 years ago | 46 mins Security Street Smarts Series CTU Senior Security Researchers Joe Stewart, Pat Litke, Brett Stone-Gross, Ph.D Understanding Threat Actor Tradecraft from the Experts Operating from the belief that insight is powerful, our foremost security researchers will giv... 8 years ago | 53 mins 2016 Q2 Malware Review: Ransomware Maturity and Evasion Techniques Brendan Griffin, Threat Intelligence Manager, PhishMe During the second quarter of 2016, ransomware has firmly established itself as a mature business model, showing no outward signs of diminishing. Encry... 6 years ago | 34 mins Stegoloader- A Stealthy Information Stealer Pierre-Marc Bureau, Dell SecureWorks Counter Threat Unit Senior Security Researcher Operating from the belief that education is the most powerful weapon, one of our foremost security researchers will provide an analysis on a recently... 8 years ago | 49 mins How to Eliminate Zero Day Threats in Web Content John Stevenson and Rebecca Hibberd with Deep Secure and McAfee 4 years ago | 21 mins Why Detection Doesn't Work Rebecca Hibberd, Aaron Mulgrew and John Stevenson See for yourself how easy it is to penetrate any cyber security defence that relies on detection based anti-virus tools. 4 years ago | 29 mins What is the Price of Employee Loyalty? John Stevenson What is the Price of Employee Loyalty? - and how can you mitigate the risk of theft using steganography? 4 years ago | 25 mins Protecting your Portal from File-based Malware John Stevenson About this Webinar: The essential everyday business requirement of receiving uploaded content from the internet opens the user to significant risk fr... 3 years ago | 32 mins