Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Taking Insider Risk Management to the Next Level Shunta Sharod Sanders Insider threats can hang out in your network for months undetected, with the cost for mitigation rising exponentially. In fact, on average, incidents ... 2 weeks ago | 21 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 2 weeks ago | 37 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 2 weeks ago | 38 mins Disrupt the Ransomware Threat Actors: Focus on Attack Chains Mark Harris,Cybersecurity Advisor & Brette Peterson, Prod Mkt Mngr Proofpoint; Brandon Dunlap, Moderator Ransomware continues to dominate the headlines with a wide range of organizations impacted. Part of its staying power is that ransomware threat actors... 5 hours ago | 60 mins What Threat Actors Don’t Want You to Know: Active Evasion Techniques Michael Tyler Cybercriminals constantly evolve their tactics to evade detection. This is especially true for phishing campaigns. Threat actors frequently use new te... 7 hours ago | 28 mins One Quarter Down: Top TTPs in Q1 2023 and Key Defensive Takeaways Scott Small, Director of Cyber Threat Intelligence, Tidal Cyber Key cyber adversaries regularly change their techniques to better accomplish their goals. Already in 2023, we’ve seen evolutions in the ransomware and... 6 hours ago | 58 mins Know Thy Enemy in 30 Minutes Steve Benton, VP Anomali Threat Research, Anomali and Nate Huber, Former Intel Analyst, FBI “If you know neither the enemy nor yourself, you will succumb in every battle.” ― Sun Tzu, The Art of War BC500 Press, media, open source, and vend... 7 hours ago | 25 mins Case study: Data protection trends and ransomware defense in the real world Cristophe Bertrand | Colm Keegan | Saurabh Sensharma | Rob Petrone Data continues to grow in scale and importance for companies of all shapes and sizes. As it does, so too does the imperative to protect it. Threat act... 4 hours ago | 50 mins Offensive And Defensive AI: Let’s Chat(GPT) About It Sam Curry, Ofer Maor, Etay Maor ChatGPT has been all over the news in the last couple of months. While AI has been around for a while, ChatGPT (and OpenAI’s Playground) simply allows... March 29, 2023 8:00am Inside the Mind of an APT John Doyle, Principal Consultant, Mandiant Recent studies show there is still a skills gap in cyber security. To help close this gap, John Doyle, Applied Intelligence Mentorship Program Lead at... March 29, 2023 3:00pm Load more