Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date [Episode - 2] Demystifying the MITRE ATT&CK Framework - Talk show Shehnaaz, Ram Vaidyanathan The episode 2 of this series talks about understanding the various attack launch techniques used by adversaries, according to the MITRE ATT&CK framewo... 2 weeks ago | 19 mins Stop Ransomware Today Matt Cooke, CyberSecurity Specialist, Proofpoint Ransomware is growing by 300% a year, with 75% of Ransomware attacks starting with a phishing email. More recently, ransomware actors have moved to a... 2 months ago | 35 mins Radware's Approach to Cloud Workload Security Eyal Arazi Moving to the cloud requires dedicated tools to protect you against the risks of cloud-native attack vectors and vulnerabilities, which are different ... 2 months ago | 17 mins Impact & Benefits of Virtualization on Quality & Performance Benchmarks Justyn Trenner - QA Financial, Raymond Smit - ING, and Istiak Ahmed - Bank of America QA Financial Webinar with guest speakers from ING and Bank of America Companies are deploying software quality initiatives with an eye on implementi... 2 months ago | 51 mins It’s Not Only Log4Shell: Handling Third-Party Security Risk Demi Ben-Ari, Co-Founder and CTO at Panorays & Lavi Lazarovitz, Head of Security Research at Cyberark Labs 2021 was a peak year for supply chain breaches—as well as vulnerabilities and backdoors in open-source code, software packages and containers. SolarWi... 4 months ago | 56 mins Material Requirements to Support Gene Therapy Development Clare Blue, Director of Analytical Development at Biogen and James Wilkinson, VP of Sales and Customer Success at Refeyn Manufacturing processes for gene therapy products are generally low yielding compared to production processes for other biologics. The material requir... 1 day ago | 73 mins The Art of Breach Detection Dr Erdal Ozkaya, CISO / Chief Cybersecurity Strategest, Comodo Cybersecurity Hackers will never stop their attack attempts, and organizations must be aware they could be breached any second! So tune into this presentation to di... 2 days ago | 53 mins API Security: Demystifying Risks of the Next Big Attack Vector Replay (APJ) Lebin Cheng, Head of API Security, Imperva and Chris Rodriguez, Research Director, Security and Trust, IDC Managing the security of APIs is one of the key business risks organizations face today as they accelerate the pace of digital transformation. Given t... 3 days ago | 47 mins Use bad-guy trends, tactics and techniques against them for effective strategy Nick Cavalancia, Founder, Techvangelism The bad news? Data breaches now play a role in ransomware and extortion attacks, espionage, cyber fraud, business-email compromise, and more. The good... 2 days ago | 34 mins Healthcare Cybersecurity: Securing Your Supply Chain Adam Mansour, Chief Security Officer | Aaron McIntosh, Director of Product Marketing Healthcare providers and organizations are highly targeted for their electronic protected health information (ePHI). It’s more valuable than other dat... 1 day ago | 31 mins Load more