Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Assess Your Vulnerability to OWASP Top 21 Automated Threats using Radware's BVS Krishnakumar Satheesh We invite you to join our upcoming webinar, on how you can leverage the Bad Bot Vulnerability Scanner Assessment to identify your vulnerability to OWA... June 12, 2023 7:00am Assess Your Vulnerability to OWASP Top 21 Automated Threats using Radware's BVS Krishnakumar Satheesh We invite you to join our upcoming webinar, on how you can leverage the Bad Bot Vulnerability Scanner Assessment to identify your vulnerability to OWA... June 12, 2023 12:00pm Winning with Weaponised Intelligence [EMEA] Ellis Fincham - EMEA Practice Manager - Threat & XDR, Rapid7 This time guest presenter Mike Owen, joins Ellis Fincham to discuss how to leverage external threat intelligence to deliver better security outcomes f... 2 days ago | 36 mins Top 5 Use Cases for Threat Intelligence Platforms (TIP) Mark Bermingham, Mark Carosella This Lunch-and-Learn webinar will highlight the key use cases for a modern Threat Intelligence Platform (TIP) and show live demonstrations of how Cywa... 21 hours ago | 31 mins Visibility, Detection, Prioritization, and Remediation of Vulns in One Place Chandrashekhar, CEO ; Preeti, Chief Architect; Koushik, Director of Engineering | SecPod Dealing with siloes and scattered interfaces is a major challenge in implementing robust security measures. It is cumbersome and time-consuming to per... June 12, 2023 3:00pm Fighting Ransomware with Vulnerability Management Andrew Pearson: Principal Security Engineer, Clint Harris, Principal Architect 2, Geoff Mefford, Cybersecurity Consultant 3 Ransomware is one of the biggest threats for organizations nowadays. The expectation is that this threat will grow even further. That is because ranso... June 13, 2023 4:00pm Cloud Cost Optimization: Improve Security and Reduce Costs Andy Ellis, Advisory CISO, and Keren Shviki, Cloud Security Detection Analyst Industry reports show that organizations waste as much as one-third of their cloud spend. Often, that wasted spend lines up with risky, unmanaged, or ... 3 days ago | 24 mins Defying the Hackers: Security Insights with Kevin Mitnick Kevin Mitnick, The World's Most Famous Hacker & Kevin Cole, Director of Technical Product Marketing at Zerto Join Zerto and Kevin Mitnick, world renowned hacker and cybersecurity expert, as he shares more about the changing threat landscape. Learn how to bols... June 13, 2023 6:00pm Fighting Financial Fraud: How Banks Can Reduce Fraud-Related Losses Jacob Silutin, Global Director of Sales Engineering at Cyberint Fraud is a costly challenge for banks and financial services providers. Even if no breach of the bank’s IT infrastructure occurs, investigating and re... 2 days ago | 49 mins Ransomware Recap 2022 Shmuel Gihon, Threat Research Team Lead at Cyberint Join us for a thorough review of ransomware activity from 2022. Cyberint Security Researcher Shmuel Gihon will discuss: - 2022 ransomware statis... 2 days ago | 51 mins Load more