Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Ransomware groups negotiation tactics: what you need to know Marc Rivero, senior security researcher, Global Research and Analysis Team, Kaspersky Cybercriminals tend to be secretive and act without disclosing their identity. However, when it comes to ransomware negotiations, the victim and the a... 3 days ago | 39 mins Coffee with a Pinch of AppSec Christopher Cummings, Principal Consultant Securing your applications requires more than just tools, but which tools do you need? And where do you start? Empirical data shows that 50% of app... 3 weeks ago | 32 mins Container Security Essentials David Benas, Associate Principal Consultant, Synopsys As the popularity of cloud-native applications continues to surge, containers are becoming the preferred option to package and deploy these applicatio... October 5, 2023 9:00am How Does Malicious Code Enter Applications? Grant Robertson, Product Manager & Kevin Scribner, Senior Product Manager Malicious code has been making headlines over the past years. The type of attacks may vary, but the consequences are real. We’ve seen a spate of malic... October 19, 2023 9:00am Why Threat Modeling Is Critical for Enterprise Cyber Defense Jake Williams, Security Researcher & Christopher Cummings, Principal Consultant. Moderated by Becky Bracken from Dark Reading As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. ... 2 months ago | 61 mins Australian Institutions targeted by Hacktivist Groups: How to Stay protected Pascal Geenens, Director, Cyber Threat Intelligence | Ron Meyran, Senior Director, Corporate Enablement Over 100 Australian sites have become a prominent target for hacktivist attacks — including the public websites of governments, airports, healthcare, ... 6 months ago | 41 mins Australian Institutions targeted by Hacktivist Groups: How to Stay protected Pascal Geenens, Director, Cyber Threat Intelligence | Ron Meyran, Senior Director, Corporate Enablement Over 100 Australian sites have become a prominent target for hacktivist attacks — including the public websites of governments, airports, healthcare, ... 6 months ago | 41 mins Protect your business from political and religious hacktivists Pascal Geenens - Director, Cyber Threat Intelligence | Ron Meyran - Senior Director, Corporate Enablement Hacktivist groups are targeting victims around the world and no one is immune. Join this webinar to get insights about cyber attack trends led by pro-... 5 months ago | 26 mins Know Your People, Know Your Risk: The Rise of Account Compromise Ryan Schwartz, Sr. Product Marketing Manager & Maritza Perez, Group Product Manager, Abnormal Security It takes 328 days to identify and contain a breach due to credential compromise. Couple this with the fact that instances of credential compromise hav... 15 hours ago | 25 mins Monthly Threat Brief: The SIG Download - Episode Zero Tricia Howard, Security Intelligence Group, Akamai The Monthly Threat Brief: The SIG Download is a brand new and unique monthly webcast series brought to you by Akamai's very own Security Intelligence ... 20 hours ago | 1 min Load more