Hi [[ session.user.profile.firstName ]]
Sort by:
    • Protecting Against Fileless Malware
      Protecting Against Fileless Malware Chad Skipper, VP Industry Relations & Product Testing & Brian Robison, Sr. Dir., Security Technology Recorded: Sep 21 2017 7:10 pm UTC 60 mins
    • How do you defend your enterprise against cyberattacks that don’t use disk-based files but, instead, execute their payloads using machine memory? This attack vector, fileless malware, requires an innovative solution that goes beyond signature-based antivirus tools.

      In this webinar, you will learn about the dangers of fileless malware and how CylancePROTECT® uses memory protection and script control to prevent advanced threats from executing on your organization’s endpoints in real time.

      Watch this webinar to:

      •Educate yourself on this attack technique and how it is impacting businesses worldwide
      •Watch a live demo of CylancePROTECT preventing fileless malware attacks
      •Understand how CylancePROTECT uses multiple protection elements to defend endpoints from advanced exploitation and evasion techniques.

      Read more >
    • Data Protection and Malware Mitigation with ActiveTrust Cloud
      Data Protection and Malware Mitigation with ActiveTrust Cloud Krupa Srivatsan Recorded: Apr 3 2018 5:00 pm UTC 43 mins
    • Your First line of Defense—DNS Security

      Your data is your crown jewel. It is also the jewel that bad actors want to steal. And they will use the least protected pathway to get to that data. Today, the least protected pathway is DNS. In addition, your workforce is increasingly mobile (according to Gartner, by 2019, 57% of workers will not be deskbound in the office) and the number of connected devices is exponentially increasing. Security needs have changed and need to be where your employees and devices are–everywhere.

      Meet your data’s own security detail – your DNS. DNS is the perfect choke point to stop not just data exfiltration through it, but also detect and stop malware like ransomware from spreading and executing. Infoblox ActiveTrust Cloud protects your devices everywhere - on or off the premises, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets. It is delivered as a service, which means you get:

      -Easy, fast, reliable, high value implementations at lower upfront costs
      -Unlimited scale
      -Ease of use without the need for dedicated IT resources

      Watch this webinar to learn how ActiveTrust Cloud can become your core defense.

      Read more >
    • An In-Depth Study on Advanced Malware and APT Attacks
      An In-Depth Study on Advanced Malware and APT Attacks RongHwa Chong, Senior Malware Researcher, FireEye Recorded: Aug 1 2013 8:30 pm UTC 50 mins
    • Today, advanced malware is overrunning traditional security defenses, leaving attackers with unfettered access to company networks and business critical data.

      As the pervasiveness of malware continues to increase, it is critical that security teams better understand today’s cyber-attack landscape to protect against advanced attacks.

      View this webinar with FireEye to learn:
      •What are the traits of Advanced Malware
      • How does a system get infected with APT malware
      • Why traditional security defenses fail to stop advanced attacks
      • What strategies can enterprises use to ensure detection
      • We will conclude with a demonstration that will showcase the capabilities of such malware attacks.

      Gain a new perspective on today's advanced malware.

      Read more >
    • Leverage Mobile to Prevent Malware from Impersonating You
      Leverage Mobile to Prevent Malware from Impersonating You Jason Soroko, Head of Malware Research, Entrust Recorded: Dec 4 2013 7:00 pm UTC 35 mins
    • As malware and malware variants proliferate across the globe, it is increasingly difficult to defend against these advanced threats. Business-critical transactions, access requests and information must be protected in a manner that does not rely on traditional, out-of-date security solutions. Secure mobile devices enable organizations to move business-critical processes out-of-band and off infected computing platforms, namely traditional desktops and laptops. With powerful native functions, mobile provides an excellent solution to thwart advanced threats — all while improving user experience and security, and offering organizations a flexible platform for security.

      Read more >
    • Leverage Mobile to Prevent Malware from Impersonating You
      Leverage Mobile to Prevent Malware from Impersonating You Jason Soroko, Head of Malware Research Recorded: Dec 4 2013 3:00 pm UTC 21 mins
    • As malware and malware variants proliferate across the globe, it is increasingly difficult to defend against these advanced threats. Business-critical transactions, access requests and information must be protected in a manner that does not rely on traditional, out-of-date security solutions. Secure mobile devices enable organizations to move business-critical processes out-of-band and off infected computing platforms, namely traditional desktops and laptops. With powerful native functions, mobile provides an excellent solution to thwart advanced threats — all while improving user experience and security, and offering organizations a flexible platform for security.

      Read more >
    • Malware Analysis: Let the Computer Do the Work!
      Malware Analysis: Let the Computer Do the Work! Thomas J. Quinlan, Malware Researcher Recorded: Jun 20 2012 1:00 pm UTC 49 mins
    • Malware analysts spend a lot of time analyzing code and looking for indicators of compromise from advanced persistent threats and even for the most seasoned analysts the volume of analysis can be prohibitive. In today's environment malware analysts need to leverage automated tools to power through large volumes of sample code and quickly receive valuable threat summaries.

      Letting the computers do the work allows the analyst to quickly identify files of greatest concern, and focus on remediating especially pernicious attacks. Malicious behavior can now be viewed right down to the kernel level, giving a complete picture of how your network was targeted by a specific cyber threat.

      Join Thomas Quinlan as he explores integrating automated threat assessment processes and defining indicators that identify specific threats to your system.

      Read more >
    • Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware
      Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware Shahid N. Shah, Cybersecurity and risk management expert, and Rene Kolga, Senior Director of Product Management at Nyotron Recorded: Feb 27 2018 8:00 pm UTC 54 mins
    • Machine Learning (ML) has become the shiny new object for security and is the foundational pillar of products such as Next-Generation Antivirus (NGAV) and User and Entity Behavior Analytics (UEBA). While most of these products have promised to be a “silver bullet” against malware, complete protection remains elusive. In fact, ML is more likely to detect and cure cancer than to stop all of today’s advanced threats for a number of reasons:

      • The past doesn’t predict the future
      • Nothing will keep the bad guys out
      • The harder you try the more you fail
      • You can’t always be connected
      • It’s a black box

      Shahid N. Shah, an internationally recognized cybersecurity and risk management expert, and Rene Kolga, Senior Director of Product Management at Nyotron, will explain these shortcomings and how to avoid them. Instead of chasing after an infinite number of malware variants and attack vectors, a different approach to malware detection is to focus on the finite intentions behind attacks, such as data exfiltration, corruption and deletion.

      Read more >
    • A Biological Perspective of Malware
      A Biological Perspective of Malware Guy Propper, Security researcher at Deep Instinct Recorded: May 16 2018 5:00 pm UTC 35 mins
    • The term “virus” exists both in biology and in computers, but how deep are the similarities and differences between biological viruses and computer malware?

      The life cycle of biological viruses, which begins in infection of the host and execution of the viral payload, and leads to the immune response of the host and the evolution of both host and virus, has many surprising similarities with malware. Concepts such as code injection, evasion and obfuscation exist both in the biological and computer realms.

      This webinar provides an understanding of each stage in the life cycle of a biological virus, and compares it to the relevant stage in the life cycle of malware. Surprising differences between malware and virus actions will be shown, and some mechanisms which are used by viruses, but have not been adopted, or even attempted by malware, will be revealed.

      Read more >
    • Making Sense of Fileless Malware
      Making Sense of Fileless Malware Guy Propper, Security researcher at Deep Instinct Recorded: Apr 25 2018 6:00 pm UTC 20 mins
    • Threat actors are constantly searching for new and sophisticated ways in which to avoid detection in order to successfully perform malicious attacks.
      During the past year there has been an extreme increase in the amount of fileless malware attacks. Fileless malware attacks pose a threat to organizations and a challenge for security vendors, due to the use of various nonexecutable file formats for infection, and the ability to execute parts of the malicious logic of the attack in-memory only.

      This phenomenon has encouraged cyber criminals to more extensively adopt fileless attack techniques, which were once mostly used by nation-states, leading to a rise in the amount of fileless attacks.

      This webinar will present a comprehensive overview of fileless malware, enabling individuals and organizations to better understand and deal with the threat posed by fileless malware.

      Read more >
    • World Map of Malware: The Geography of Hostile Code
      World Map of Malware: The Geography of Hostile Code Dr. Kenneth Geers, Chief Research Scientist Comodo Cybersecurity Upcoming: Jul 17 2018 4:00 pm UTC 60 mins
    • Zero-day malware--new malware that has never been seen before-- continues to plague businesses of all sizes. Millions of these unknown files are being crafted or modified each year. They cannot be detected by existing security systems; they hide on endpoints and networks and remain among the most important and effective tools hackers use.

      Join Chief Research Scientist at Comodo Cybersecurity and NATO Cooperative Cyber Defense Centre of Excellence Ambassador, Dr. Kenneth Geers as he analyzes how geopolitical events affect malware in the world's hottest cyber-attack zones. Webinar attendees will learn:
      • How cyber defenders benefit from spending more time on strategic cyber defense analysis.
      • Why cities, countries, continents, verticals and even geopolitical events have their own malware fingerprint.
      • How threat research and intelligence can quickly provide actionable intelligence to Network Security professionals at the tactical level.

      The session draws on data from Comodo Cybersecurity's Threat Intelligence Team's analysis of 300 million malware incidents in the first six months of 2018 and how you can leverage this technology to enhance your IT infrastructure.

      Read more >