Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cabells Whitelist & Blacklist Demonstration; New Web Interface and Features Lucas Toutloff Cabells introduces two new important features: the Journal Blacklist, the only blacklist of deceptive and predatory academic journals, and Altmetric R... 6 years ago | 48 mins Iranian-Backed OilRig Group Returns with Next-Generation Malware Rene Kolga, Senior Director of Product Management at Nyotron and Robert Zamani, Director of Solutions Architect at Nyotron Nyotron’s research team began tracking new active OilRig attacks on a number of organizations across the Middle East in November 2017. Our security t... 5 years ago | 43 mins An Inside Look: Top Windows Logs for User Behavior Analysis Randy Franklin Smith, Windows Security Expert (UWS); Matt Willems, Technical Product Manager (LogRhythm) User and entity behavior analytics (UEBA) and security information and event management (SIEM) are separate security solutions that can work together ... 4 years ago | 105 mins Beyond the Marriott Breach - What to Expect in 2019 Speakers: Nir Gaist, CTO/Founder and Robert Zamani, Director of Solutions Architect. Moderator: Rene Kolga, Product What will 2019 bring for the security landscape? How many Marriott-like breaches should you expect? What new types of attacks are you likely to see, a... 4 years ago | 64 mins How to Effectively Monitor and Manage IT Assets in Real-Time Dixitha - SecPod Product Marketing Lead "You cannot protect what you cannot see." Getting complete visibility over the IT assets in your network is crucial for both managing and securing end... 1 year ago | 34 mins Achieving Zero Trust During Runtime Virsec The battleground for advanced attacks has moved into application workloads and is being fought in runtime. Most people think of Zero Trust in relatio... 2 years ago | 29 mins From Ransomware to Leakware Ira Winkler, Security Evangelist & Nir Gaist, Founder/CTO Just like legitimate businesses adapt, transform and innovate, cybercriminals behind major strains of ransomware are updating their business model. Ra... 2 years ago | 57 mins Should More Protection Really Equal More False Positives? Nir Gaist, Founder & CTO, Nyotron Security professionals accept the paradigm of “more protection equals more false positives (FPs)” as a fact of life. The tighter they make the “screws... 4 years ago | 30 mins Identity is a Game Changing Model for Cloud Security - So What is it? Mark Jimenez, Technical Marketing Engineer, Aporeto Migrating workloads to the cloud can be a daunting task for many enterprise organizations. This is especially challenging when trying to combine an on... 4 years ago | 63 mins Right of Cyber Boom Ira Winkler, Security Evangelist Every time a cyberattacker tricks a user into clicking on a malicious link or downloading a malicious file, all the blame falls on the user’s shoulder... 3 years ago | 46 mins Load more