Hi [[ session.user.profile.firstName ]]
Sort by:
    • IoT Exploit: How a Lightbulb Almost Stopped Christmas
      IoT Exploit: How a Lightbulb Almost Stopped Christmas Joseph Carson, Chief Security Scientist at Thycotic Recorded: Oct 5 2018 4:00 pm UTC 61 mins
    • This webcast is part of National Cyber Security Awareness Month (NCSAM) on BrightTALK.

      It is critically important to know how cyber criminals target their victims, what you can do to reduce the risk and make it more challenging for the attackers who steal your information, your identity or your money.

      This session explains how outside attackers or malicious insiders can exploit vulnerabilities using examples such as a compromised email account password that escalates into a full-blown breach of network security and how a light bulb almost stopped Christmas from happening.

      - This session describes the anatomy of a privileged account hack
      - The risks of introducing IoT for ease of use but sacrificing security
      - We will show how cybercriminals target their victims
      - What you can do to reduce your risk and prevent abuse of your critical information assets

      Read more >
    • Protect and Prevent: 3 strategies for blocking fileless attacks and exploits
      Protect and Prevent: 3 strategies for blocking fileless attacks and exploits Jack Danahy, CTO, Barkly Recorded: Nov 28 2017 6:00 pm UTC 49 mins
    • Ransomware continues to experience record growth in 2017. Traditional solutions aren't enough and can't keep up with hundreds of thousands of new malware versions created daily. File-less attacks and exploits are now the most common vectors for successful ransomware attacks and most companies aren't protected.

      Learn the three strategies Avidia Bank implemented to shut out today's sophisticated threats and how you can apply them to protect your own organization:

      Register now to learn more on:

      - How ransomware is going fileless to get past protection
      - What makes everyone a target
      - Three protection strategies to minimize the risk to your organization


      Jack Danahy is the co-founder and CTO of Barkly, the Endpoint Protection Platform that delivers the strongest protection with the fewest false positives and simplest management. A 25-year innovator in computer, network and data security, Jack was previously the founder and CEO of two successful security companies: Qiave Technologies (acquired by Watchguard Technologies in 2000) and Ounce Labs (acquired by IBM in 2009). Jack is a frequent writer and speaker on security and security issues, and has received multiple patents in a variety of security technologies. Prior to founding Barkly, he was the Director of Advanced Security for IBM, and led the delivery of security services for IBM in North America.

      Read more >
    • IoT Architecture, Vulnerabilities and Exploits
      IoT Architecture, Vulnerabilities and Exploits Kevin McNamee, Nokia's Threat Intelligence Lab Recorded: Jun 13 2018 9:00 pm UTC 62 mins
    • This webinar will explore the end-to-end IoT architectures that are in use today. This will be done from a security perspective, itemizing the vulnerabilities that are present at each level of the architecture.

      Kevin McNamee of Nokia's Threat Intelligence Lab will then take a detailed look at actual exploits of IoT vulnerabilities from field cases over the past couple of years. The webinar will conclude with a summary of actions that can be taken to reduce the risk of cyberattack and subsequent compromise of IoT devices.

      About the Speaker:
      Kevin McNamee heads up Nokia's Threat Intelligence Lab. This lab analyzes thousands of mobile malware samples each day to create the detection rules that power Nokia’s network based malware detection system. Previously at Alcatel-Lucent he was director of Security Research with Alcatel-Lucent's Bell Labs, specializing in the analysis of malware propagation and detection. He has had speaking engagements at RSA, BlackHat, SECTOR, (ISC)2, Virus Bulletin and BSides.

      Read more >
    • Prevention Week Part 2: Defeat Zero-Day Exploits by Automating Prevention
      Prevention Week Part 2: Defeat Zero-Day Exploits by Automating Prevention Michael Moshiri | Director, Advanced Endpoint Protection at Palo Alto Networks Recorded: Jul 19 2016 5:00 pm UTC 61 mins
    • Your endpoint security should easily prevent known threats. But can it also prevent unknown threats from compromising your environment? More importantly, can it automate this prevention so you don’t have to assign scarce resource to investigate alerts?

      In this webinar, you’ll discover a revolutionary approach to defeating zero-day exploits. We’ll examine current approaches to exploit prevention, discuss the top 10 zero-day exploits of 2015, and analyze unknown threats on the day they became known.

      You’ll learn:
      •How to future-proof your endpoint security to protect your users from unknown threats
      •Why other approaches to endpoint protection cannot prevent zero-day exploits
      •Which applications were targeted by the top 10 zero-day exploits discovered in 2015
      •How to automate threat prevention through a natively-integrated, next-generation security platform

      Read more >
    • Weekly Threat Byte | Hurricane Michael Exploits
      Weekly Threat Byte | Hurricane Michael Exploits Proofpoint Recorded: Nov 13 2018 7:05 pm UTC 7 mins
    • For this week’s Interesting Threaty Byte, we bring you Hurricane Michael Exploits. Hurricane Michael Exploits are a group of phishing campaign schemes that utilized the Hurricane Michael disaster as a way to exploit victims and people that would like to help. Typically threat actors go after credit card numbers that are given to them through fradulent donation sites and emails. The Hurricane Michael Exploits are different in that they focus on the current phishing trend of convincing victims to give their webmail credentials instead of credit card numbers. This new method shows the threat actor's desire to access victim's webmail applications instead of directly going after money.

      Read more >
    • Inside a Docker Cryptojacking Exploit
      Inside a Docker Cryptojacking Exploit Ethan Hansen, Threat Stack Security Analyst Recorded: Nov 15 2018 6:00 pm UTC 30 mins
    • Docker containers are often used to create developer sandbox environments. Because Docker containers can be lightweight, ephemeral infrastructure, they’re a natural fit for building sandboxes. While Docker is great at managing the lifecycle of these workloads, it’s not a security tool.

      In this webinar, Ethan Hansen, Security Analyst for Threat Stack’s Cloud Security Operations Program, will discuss recently observed Docker exploit attempts from the field, where attackers were looking for web applications vulnerable to command injection. He’ll also provide examples of what to watch for in your logs, cryptojacking and container breakout attempts among them.

      Read more >
    • Cloud Security: Identity Attacks That Exploit Your Broken Authentication
      Cloud Security: Identity Attacks That Exploit Your Broken Authentication Teju Shyamsundar, Okta, Sr. Product Marketing Manager Recorded: Oct 24 2018 6:00 pm UTC 27 mins
    • It’s no secret that today’s hackers are smarter than ever before - a motivated hacker can use a variety of different methods to steal passwords from unsuspecting users.

      While two-factor authentication solutions have been around for a while, they're no longer comprehensive enough to defend the new perimeter. Join us to learn the anatomy of common identity attacks, and how to keep hackers out of your organization.

      We’ll discuss:

      Identity attacks that exploit insecure methods of authentication
      How to add a smart layer of security over your critical apps, services, and devices
      What to look for in a multi-factor authentication solution

      Speaker: Teju Shyamsundar, Okta, Sr. Product Marketing Manager

      Bio: Teju is a Product Marketing Manager on Okta's product team, focusing on integrations across Okta's set of core products. She is responsible for driving the value of the integrations across not just Okta's products, but also integrations with the vendors that Okta partners with. Prior to Okta, Teju was a field engineer at Microsoft, focusing on getting customers setup with enterprise mobility deployments.

      Read more >
    • A New Way of Predicting Exploitability - Kenna Security with Exploit Prediction
      A New Way of Predicting Exploitability - Kenna Security with Exploit Prediction Ed Bellis, CTO, Co-Founder, Michael Roytman, Chief Data Scientist Recorded: Mar 21 2018 5:00 pm UTC 41 mins
    • Do you think security is overdue for actionable forecasts rather than security dogma? Are you a security leader tired of worrying about the next vulnerability with a logo and a web site? If we can forecast the weather, we can use similar models to foresee which vulnerabilities attackers are likely to weaponize.

      Join Kenna Security's Michael Roytman, Chief Data Scientist and Ed Bellis, CTO, Co-Founder and ex-CISO at Orbitz for a live webinar where they will debut Kenna Security's new Exploit Prediction, the industry's first vulnerability exploit prediction capability, a significant breakthrough for security professionals looking to develop a more mature proactive approach to vulnerability management.

      In this webinar cover:

      "How Kenna Exploit Prediction has delivered 94 percent predictive accuracy
      "How to adopt a proactive approach to contextualize, prioritize and remediate vulnerabilities, based on risk
      "How the Kenna Security Platform with Exploit Predictions can help align security, IT operations, and executive management with a single view of risk
      "A demonstration of the Kenna Security platform with the new Exploit Prediction capabilities

      Read more >
    • Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
      Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Jan 9 2018 6:00 pm UTC 37 mins
    • As you've likely heard, Meltdown and Spectre are vulnerabilities that exist in Intel CPUs built since 1995. Hackers can exploit Meltdown and Spectre to get hold of information stored in the memory of other running programs. This might include passwords stored in a password manager or browser, photos, emails, instant messages and even business-critical documents.

      Join us for a technical webcast to learn more about these threats, and how the security controls in AlienVault Unified Security Management (USM) can help you mitigate these threats.

      You'll learn:

      What the AlienVault Labs security research team has learned about these threats
      How to scan your environment (cloud and on-premises) for the vulnerability with AlienVault USM Anywhere
      How built-in intrusion detection capabilities of USM Anywhere can detect exploits of these vulnerabilities
      How the incident response capabilities in USM Anywhere can help you mitigate attacks

      Hosted By
      Sacha Dawes
      Principal Product Marketing Manager
      Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.

      Read more >
    • Take a Deeper Dive: A Flaw, a Vulnerability, and an Exploit
      Take a Deeper Dive: A Flaw, a Vulnerability, and an Exploit Nathan Michalov, CA Veracode Solutions Architect Recorded: Jun 13 2018 3:30 pm UTC 18 mins
    • Your organization cannot afford to let potential system flaws or weaknesses in your software applications be exploited. That is why knowing the distinct differences between these weaknesses is critical in successfully addressing them. During this webinar, one of CA Veracode’s security implementation experts will discuss how to identify these risk factors within your application landscape, and to:

      •Learn a practical approach to helping security and development teams address these factors
      •Learn about the methods and solutions attackers typically rely on to perform application vulnerability discovery and compromise
      •Learn from examples of how organizations rely on application security technology and services to gain visibility into their overall landscape – and act upon it in the right way

      Read more >
    • Petya Variant Ransomware: How to Detect the Vulnerability and Exploits
      Petya Variant Ransomware: How to Detect the Vulnerability and Exploits Sacha Dawes, Principal Product Marketing Manager. Chris Doman, Threat Engineer Recorded: Jun 27 2017 6:35 pm UTC 32 mins
    • As you've likely heard, a variant of the Petya malware is spreading rapidly and is known to have affected organizations worldwide, regardless of size. This variant of Petya follows a similar attack method to last month's WannaCry ransomware, though it uses the PsExec and WMI services for distribution.

      Once compromised, the ransomware will overwrite the Master Boot Record (MBR), encrypt individual files that match a list of file extensions (including documents, archives, and more), and after a reboot of the system will present the user a message requesting a ransom in Bitcoin to decrypt the system. As with WannaCry, the ETERNALBLUE exploit toolkit (which was released by the Shadow Brokers group in April 2017) is suspected to be a key part of the attack.

      Join us for a 30-minute technical webcast to learn more about this Petya variant, and how the unified security controls in AlienVault USM Anywhere can help you quickly identify vulnerable systems and attacks.

      You'll learn:

      What the AlienVault Labs security research team has uncovered about this threat
      How to scan your environment (cloud and on-premises) for critical vulnerabilities with AlienVault USM
      How AlienVault USM leverages threat intelligence for early detection of threats like this variant of Petya
      How built-in response orchestration capabilities in AlienVault USM can stop the threat from spreading

      Read more >