Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Threat Hunting: Strategies for Active Threat Detection Gregg Anders, Chief Platform Architect, Fidelis Cybersecurity Can a single XDR platform really help you better detect and hunt cyber threats anywhere on your network? To effectively defend against the growing thr... 3 weeks ago | 51 mins KELA's Advanced Threat Hunting Workshop: Level Up Your Cyber Skills Victoria Kivilevich, Director of Threat Research, KELA Ransomware blogs, criminal telegram groups, illicit markets, database dumps, and cybercrime communities—the threats sown in this chaotic cybercrime un... 1 month ago | 56 mins Unify Detection and Response with MITRE ATT&CK Deepak Kolingivadi, Director of Product Management - Security at ServiceNow The MITRE ATT&CK framework is a knowledge base of cyberattack tactics and techniques used as a foundation for the development of specific threat model... June 27, 2023 4:00pm Lessons From Billions of Breached Records Troy Hunt, Founder and CEO of Have I Been Pwned, Microsoft Regional Director & MVP; Bar Kaduri, Orca Security Security flaws, hackers and data breaches are the new normal. It’s not just those of us in the industry facing these foes every single day; it’s every... 3 weeks ago | 23 mins SIGMA rules and how to use them VLADISLAV BURTSEV, VLADIMIR KUSKOV, NIKITA NAZAROV These days the security industry is heavily packed with different tools and systems to control and prevent possible cyberattacks, making it easy to ge... 3 weeks ago | 25 mins We'll Hunt For You: Introducing Akamai's Newest Security Service Dan Petrillo, Director, Product Marketing at Akamai Join us to learn more about Akamai’s newest security service, Hunt. As cyberthreats evolve, adversaries manage to evade even the most advanced securi... 2 months ago | 19 mins Respond to Resume Operations & Hunt to Prevent Compromise- Webinar Series Part 4 Omar Toor, Principal Consultant, Mandiant, Dan Nutting, Manager, Consulting, Mandiant This session is the fourth in our multipart virtual series that will provide helpful insights and best practices surrounding the six critical function... 2 months ago | 61 mins Securing Law Firms Against The Top Web and Email-Borne Cyber Threats Spence Hutchinson, Principal Threat Researcher, eSentire Safeguarding your legal firm from cyberattacks and threats caused by user execution takes an understanding of the threats, a robust cybersecurity prog... 6 months ago | 32 mins How to Hunt Cyber Threats with Deception Dan Brett, CSO CounterCraft, and Nahim Fazal Threat hunting is still a relatively new concept in the world of cyber security, but already, there are a number of different approaches emerging on h... 6 months ago | 57 mins February 2023 TRU Intelligence Briefing Paul Aitken, Matt Tilley, Edward Crowder In this month’s TRU Intelligence Briefing, the Threat Response Unit reviewed: - Threat Landscape: A review of recently observed malware by the SOC suc... 4 months ago | 40 mins Load more