Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The Total Economic Impact of Layer7: An Analysis of Savings & Business Benefits Bill Oakes, CISSP - head of product marketing for Layer7, Jonathan Whaling, Forrester TEI Consulting This session expands upon the recent Total Economic Impact of Broadcom Layer7 API Management Study by Forrester Consulting. After a brief explanation... 11 months ago | 55 mins Phish Friday: Hidden Text and Zero Font Dave Baggett, CEO and Co-founder, Bukar Alibe, Data Analyst Some phishing emails use something called zero font — text hidden in an email by various means. But what exactly is this technique, and why do attacke... 2 years ago | 27 mins Phish Friday: Text Direction Deception Dave Baggett, CEO, INKY Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool both human recipients and mail protection software. Sophi... 3 years ago | 19 mins Phishing Threats Overview for Legacy Gateways and Microsoft 365 Pete Starr, Global Director of Sales Engineering at Cyren Cyren’s latest threat report discusses how phishing attacks continue to circumvent legacy security gateways and are the top threat targeting businesse... 3 years ago | 37 mins Spearphishing, Whaling, and Other Targeted Social Engineering Attacks On Your Us ERICH KRON, SECURITY AWARENESS ADVOCATE, KNOWBE4 Most major enterprise data breaches begin with an attempt to fool a single user on your network. Whether they are targeting top executives, financial ... 6 years ago | 71 mins 2020 Threat Report: Phishing Prevention during a Pandemic Pete Starr, Global Director of Sales Engineering at Cyren Cyren’s latest threat report discusses how phishing attacks continue to circumvent legacy security gateways and are the top threat targeting businesse... 3 years ago | 36 mins Security+ Objective 1.2 Donald E Hester & Robert DeRoeck In this webinar we are going to cover CompTIA’s SY0-501 Security+ certification exam objective 1.2: Compare and contrast types of attacks. Social Eng... 4 years ago | 130 mins Phishing: Sinister or Simply Good Business (For the cyberattacker) Josh Bartolomie We hear horror stories about users clicking on some malware-enabled payload and all of a sudden all of the codes for their hardware security fobs are ... 4 years ago | 37 mins There Will Be Attacks - Prepare Your Email Defenses Today Steven Malone, Director of Product Management - Mimecast Email threats are evolving. Today, a whopping 91% of cyberattacks start with an email. Join this session and learn about latest trends in email attack... 6 years ago | 56 mins Phish Friday: COVID-19 Phishing Scams (Part 1) Dave Baggett, CEO and Co-founder, Bukar Alibe, Data Analyst Join us every month as email security experts discuss hot topics in phishing scams and tactics and preventative measures to avoid them. This week: T... 3 years ago | 25 mins