Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Dismantling Ransomware with Unified Endpoint Management Nick Cavalancia, Conversational Geek | Kent Feid, Quest Software In 2022, on average, there was a ransomware attack every 11 seconds (CyberSecurity Ventures). Given the risk environment, it’s important to stay ahead... February 14, 2023 10:00am What's Next for Email Security as Socially Engineered Attacks Outsmart Defenses? Ram Ganeshanathan, VP of Enterprise Security at ARM and Jason Lang, Team Lead of Targeted Operations at TrustedSec Secure Email Gateways are no match for the increased sophistication of inbound attacks. Join this webinar for an exclusive peek from TrustedSec into ... February 9, 2023 4:00pm BEC Defense: Perspectives of a CISO Turned Research Analyst Brian Wrozek, Guest Speaker from Forrester, John Stevenson, Security Product Director at Cyren It’s become cliché that email is the top attack vector and users are the weakest link. What if email was no longer the top attack vector and users wer... February 9, 2023 4:00pm Dark market for corporate data: how cybercriminals sell access to your company Yuliya Novikova and Sergey Shcherbel, Kaspersky The sensitive data stolen from companies during a cyberattack often ends up on darknet markets. With the rise of the cybercrime as a service business ... 6 days ago | 39 mins Security Awareness Service: 45 Minute Guide To Strengthening The Human Firewall Andy Syrewicze, Microsoft MVP, Matthew Frye, Head of Presales and Education What is the weakest link in any organization's defence? Weak IT security, vulnerable, creaking IT or firewalls that are lacking? The answer is closer ... 6 days ago | 55 mins Why Agari Brand Protection Is Essential to Your DMARC Journey Mike Jones, Sr Director of Product Management at Fortra Implementing DMARC is one of the simplest ways to prevent email spoofing, which is the primary vector for cybercriminals to deliver phishing campaigns... 3 weeks ago | 29 mins Be an IT Superhero: Recover Fasterfrom Ransomware & Prevent Data Loss in 3 Steps Will Urban, W. Curtis Preston, and Peter Elliman, Druva The frequency and impact of ransomware attacks continues to rise despite the hard work of both security and IT teams. Data protection is the last lin... 2 weeks ago | 57 mins Red Teaming Series – EP1 – Talking with industry Experts on Offensive Security Pascal Geenens, Radware | Daniel Smith, Radware | Snir Ben Shimol, Cider Security Simply deploying security solutions isn’t going to cut it. Today’s threat landscape constantly evolves and requires organizations to test and validate... 3 weeks ago | 31 mins Red Teaming Series – EP1 – Talking with industry Experts on Offensive Security Pascal Geenens, Radware | Daniel Smith, Radware | Snir Ben Shimol, Cider Security Simply deploying security solutions isn’t going to cut it. Today’s threat landscape constantly evolves and requires organizations to test and validate... 3 weeks ago | 31 mins Red Teaming Series – EP1 – Talking with industry Experts on Offensive Security Pascal Geenens, Radware | Daniel Smith, Radware | Snir Ben Shimol, Cider Security Simply deploying security solutions isn’t going to cut it. Today’s threat landscape constantly evolves and requires organizations to test and validate... 3 weeks ago | 31 mins Load more