Hi [[ session.user.profile.firstName ]]
Sort by:
    • Protecting Against Fileless Malware
      Protecting Against Fileless Malware Chad Skipper, VP Industry Relations & Product Testing & Brian Robison, Sr. Dir., Security Technology Recorded: Sep 21 2017 7:10 pm UTC 60 mins
    • How do you defend your enterprise against cyberattacks that don’t use disk-based files but, instead, execute their payloads using machine memory? This attack vector, fileless malware, requires an innovative solution that goes beyond signature-based antivirus tools.

      In this webinar, you will learn about the dangers of fileless malware and how CylancePROTECT® uses memory protection and script control to prevent advanced threats from executing on your organization’s endpoints in real time.

      Watch this webinar to:

      •Educate yourself on this attack technique and how it is impacting businesses worldwide
      •Watch a live demo of CylancePROTECT preventing fileless malware attacks
      •Understand how CylancePROTECT uses multiple protection elements to defend endpoints from advanced exploitation and evasion techniques.

      Read more >
    • An In-Depth Study on Advanced Malware and APT Attacks
      An In-Depth Study on Advanced Malware and APT Attacks RongHwa Chong, Senior Malware Researcher, FireEye Recorded: Aug 1 2013 8:30 pm UTC 50 mins
    • Today, advanced malware is overrunning traditional security defenses, leaving attackers with unfettered access to company networks and business critical data.

      As the pervasiveness of malware continues to increase, it is critical that security teams better understand today’s cyber-attack landscape to protect against advanced attacks.

      View this webinar with FireEye to learn:
      •What are the traits of Advanced Malware
      • How does a system get infected with APT malware
      • Why traditional security defenses fail to stop advanced attacks
      • What strategies can enterprises use to ensure detection
      • We will conclude with a demonstration that will showcase the capabilities of such malware attacks.

      Gain a new perspective on today's advanced malware.

      Read more >
    • Leverage Mobile to Prevent Malware from Impersonating You
      Leverage Mobile to Prevent Malware from Impersonating You Jason Soroko, Head of Malware Research, Entrust Recorded: Dec 4 2013 7:00 pm UTC 35 mins
    • As malware and malware variants proliferate across the globe, it is increasingly difficult to defend against these advanced threats. Business-critical transactions, access requests and information must be protected in a manner that does not rely on traditional, out-of-date security solutions. Secure mobile devices enable organizations to move business-critical processes out-of-band and off infected computing platforms, namely traditional desktops and laptops. With powerful native functions, mobile provides an excellent solution to thwart advanced threats — all while improving user experience and security, and offering organizations a flexible platform for security.

      Read more >
    • Leverage Mobile to Prevent Malware from Impersonating You
      Leverage Mobile to Prevent Malware from Impersonating You Jason Soroko, Head of Malware Research Recorded: Dec 4 2013 3:00 pm UTC 21 mins
    • As malware and malware variants proliferate across the globe, it is increasingly difficult to defend against these advanced threats. Business-critical transactions, access requests and information must be protected in a manner that does not rely on traditional, out-of-date security solutions. Secure mobile devices enable organizations to move business-critical processes out-of-band and off infected computing platforms, namely traditional desktops and laptops. With powerful native functions, mobile provides an excellent solution to thwart advanced threats — all while improving user experience and security, and offering organizations a flexible platform for security.

      Read more >
    • Malware Analysis: Let the Computer Do the Work!
      Malware Analysis: Let the Computer Do the Work! Thomas J. Quinlan, Malware Researcher Recorded: Jun 20 2012 1:00 pm UTC 49 mins
    • Malware analysts spend a lot of time analyzing code and looking for indicators of compromise from advanced persistent threats and even for the most seasoned analysts the volume of analysis can be prohibitive. In today's environment malware analysts need to leverage automated tools to power through large volumes of sample code and quickly receive valuable threat summaries.

      Letting the computers do the work allows the analyst to quickly identify files of greatest concern, and focus on remediating especially pernicious attacks. Malicious behavior can now be viewed right down to the kernel level, giving a complete picture of how your network was targeted by a specific cyber threat.

      Join Thomas Quinlan as he explores integrating automated threat assessment processes and defining indicators that identify specific threats to your system.

      Read more >
    • 2016 Malware Year in Review: Tricks, Threats, and Triumphs
      2016 Malware Year in Review: Tricks, Threats, and Triumphs Brendan Griffin, Threat Intelligence Manager at PhishMe Recorded: Mar 14 2017 8:00 pm UTC 60 mins
    • In 2016, the PhishMe Intelligence team saw over 2,500 active threat reports, the widespread implementation of anti-analysis methods, a notable evolution in techniques and tools to deliver malware, and the growing threat of encryption ransomware.

      Now more than ever, it has become more important to detect and interdict malware during the delivery phase. What can you do to defend your environment? What will threat actors do to step things up in 2017?

      Join Brendan Griffin, to learn about:

      •The evolution of malware and encrypted ransomware
      •2016’s most prevalent threats
      •Identifying the latest malware delivery tools and techniques
      •Developing a modern defense strategy and empowering your users
      •What to look out for in 2017

      Read more >
    • How Threat Intelligence Helps You Combat Targeted Malware
      How Threat Intelligence Helps You Combat Targeted Malware Jeremy Linden of Cisco Umbrella, Jessica Bair of Cisco Threat Grid and Mike Clark of ThreatQuotient Recorded: Sep 7 2017 5:00 pm UTC 38 mins
    • As malware becomes more complicated and harder to detect, cyber analysts are increasingly inundated with more work. The more menial tasks a security team performs, the less likely they are to have the time to properly analyze or defend against malware. There are steps you can take to defend against malware and protect your organization.

      Join this webinar with experts Jeremy Linden of Cisco Umbrella, Jessica Bair of Cisco Threat Grid and Mike Clark of ThreatQuotient as they discuss how to utilize a Threat Intelligence Platform to enhance malware analysis capabilities and prevent access to malicious domains. Visit the Cisco Marketplace to learn more.

      In the webinar, you will learn to:
      - Streamline malware analysis workflow
      - Add context to malware analysis results using validated threat intelligence
      - Make informed decisions efficiently and effectively
      - Take action from a centralized workbench to minimize your risk window

      Read more >
    • 2017 Malware Trends - WannaCry, NotPetya, Emotet and more
      2017 Malware Trends - WannaCry, NotPetya, Emotet and more Jack Danahy, CTO, Barkly Recorded: Aug 29 2017 5:30 pm UTC 39 mins
    • Ransomware and destructive malware attacks have had tremendous growth and impact in 2017, and it’s only August. Not only has there been a rise in the severity and frequency of attacks, but the level of sophistication, attack vectors and attack motives have also changed.

      Join this webinar to hear Jack Danahy, CTO, Barkly discuss 2017 malware attack trends to date, including WannaCry, NotPetya, Emotet and more. You’ll learn the similarities and differences about these attacks and how the attack landscape is changing.

      Viewers will learn about:
      * 2017 Malware trends and stats
      * How the threat landscape is changing
      * How to protect your organization

      About the Presenter:
      Jack Danahy is the co-founder and CTO of Barkly, the Endpoint Protection Platform that delivers the strongest protection with the fewest false positives and simplest management. A 25-year innovator in computer, network and data security, Jack was previously the founder and CEO of two successful security companies: Qiave Technologies (acquired by Watchguard Technologies in 2000) and Ounce Labs (acquired by IBM in 2009). Jack is a frequent writer and speaker on security and security issues, and has received multiple patents in a variety of security technologies. Prior to founding Barkly, he was the Director of Advanced Security for IBM, and led the delivery of security services for IBM in North America.

      Read more >
    • Q3 Malware Review:  Evolution of Locky and Quiet Malware
      Q3 Malware Review: Evolution of Locky and Quiet Malware Brendan Griffin, Threat Intelligence Manager, PhishMe Recorded: Nov 16 2016 5:00 pm UTC 33 mins
    • During the third quarter of 2016, the PhishMe Intelligence team generated 689 active threat reports that highlighted indicators of compromise, tactics, and techniques that serve as the hallmarks of phishing attacks. Two key stories stood out this quarter. Locky continued to steal headlines as the dominant ransomware by continuing to innovate and avoid detection by experts. Meanwhile, other, quieter malware remained an ever-present threat to companies of all sizes. Join Brendan Griffin, Threat Intelligence Manager, PhishMe to learn about:

      •Evolution of Locky Ransomware
      •Challenges faced by malware researchers against the constantly evolving ransomware
      •Quiet malware and their proliferation
      •Ransomware versus Quiet Malware business models

      Read more >
    • Battling Unknown Malware With Machine Learning
      Battling Unknown Malware With Machine Learning Dr. Sven Krasser, Chief Scientist, CrowdStrike Recorded: Feb 13 2017 10:00 pm UTC 58 mins
    • Learn about the first signature-less engine to be integrated into VirusTotal

      CrowdStrike recently made headlines by announcing that it is the first machine learning-based engine to be integrated into VirusTotal. VirusTotal is the premier nexus where all reputable AV vendors transparently publicize their detection results and share malware data for the greater good. The addition of CrowdStrike’s advanced machine learning engine to this anti-malware industry staple is a major leap forward for users who rely on VirusTotal capabilities to help defend their endpoints.

      In this live CrowdCast, CrowdStrike’s Chief Scientist Dr. Sven Krasser offers an exclusive look “under the hood” of this unique machine learning engine, revealing how it works, how it differs from all other signature-based engines integrated into VirusTotal to date, and how it fits into the larger ecosystem of techniques used by CrowdStrike Falcon to keep endpoints and environments safe.

      Topics will include:

      •What CrowdStrike Falcon machine learning is and how it works
      •How to interpret results of machine learning-based threat detection
      •How users can benefit from the CrowdStrike Falcon machine learning engine
      •How this cutting-edge technology fits into the CrowdStrike Falcon breach prevention platform


      Featured Speaker:

      Dr. Sven Krasser
      Chief Scientist, CrowdStrike

      Dr. Sven Krasser is a recognized authority on network and host security. He currently serves as Chief Scientist for CrowdStrike, where he oversees the development of endhost and cloud-based Big Data technologies. Previously, Dr. Krasser was at McAfee where he led the data analysis and classification efforts for TrustedSource. He is the lead inventor of numerous key patented and patent-pending network and host security technologies and is the author of numerous publications on networking and security technologies.

      Read more >