Hi [[ session.user.profile.firstName ]]
Sort by:
    • Battling Unknown Malware With Machine Learning
      Battling Unknown Malware With Machine Learning Dr. Sven Krasser, Chief Scientist, CrowdStrike Recorded: Feb 13 2017 10:00 pm UTC 58 mins
    • Learn about the first signature-less engine to be integrated into VirusTotal

      CrowdStrike recently made headlines by announcing that it is the first machine learning-based engine to be integrated into VirusTotal. VirusTotal is the premier nexus where all reputable AV vendors transparently publicize their detection results and share malware data for the greater good. The addition of CrowdStrike’s advanced machine learning engine to this anti-malware industry staple is a major leap forward for users who rely on VirusTotal capabilities to help defend their endpoints.

      In this live CrowdCast, CrowdStrike’s Chief Scientist Dr. Sven Krasser offers an exclusive look “under the hood” of this unique machine learning engine, revealing how it works, how it differs from all other signature-based engines integrated into VirusTotal to date, and how it fits into the larger ecosystem of techniques used by CrowdStrike Falcon to keep endpoints and environments safe.

      Topics will include:

      •What CrowdStrike Falcon machine learning is and how it works
      •How to interpret results of machine learning-based threat detection
      •How users can benefit from the CrowdStrike Falcon machine learning engine
      •How this cutting-edge technology fits into the CrowdStrike Falcon breach prevention platform


      Featured Speaker:

      Dr. Sven Krasser
      Chief Scientist, CrowdStrike

      Dr. Sven Krasser is a recognized authority on network and host security. He currently serves as Chief Scientist for CrowdStrike, where he oversees the development of endhost and cloud-based Big Data technologies. Previously, Dr. Krasser was at McAfee where he led the data analysis and classification efforts for TrustedSource. He is the lead inventor of numerous key patented and patent-pending network and host security technologies and is the author of numerous publications on networking and security technologies.

      Read more >
    • Leverage Mobile to Prevent Malware from Impersonating You
      Leverage Mobile to Prevent Malware from Impersonating You Jason Soroko, Head of Malware Research, Entrust Recorded: Dec 4 2013 7:00 pm UTC 35 mins
    • As malware and malware variants proliferate across the globe, it is increasingly difficult to defend against these advanced threats. Business-critical transactions, access requests and information must be protected in a manner that does not rely on traditional, out-of-date security solutions. Secure mobile devices enable organizations to move business-critical processes out-of-band and off infected computing platforms, namely traditional desktops and laptops. With powerful native functions, mobile provides an excellent solution to thwart advanced threats — all while improving user experience and security, and offering organizations a flexible platform for security.

      Read more >
    • 2016 Malware Year in Review: Tricks, Threats, and Triumphs
      2016 Malware Year in Review: Tricks, Threats, and Triumphs Brendan Griffin, Threat Intelligence Manager at PhishMe Recorded: Mar 14 2017 8:00 pm UTC 60 mins
    • In 2016, the PhishMe Intelligence team saw over 2,500 active threat reports, the widespread implementation of anti-analysis methods, a notable evolution in techniques and tools to deliver malware, and the growing threat of encryption ransomware.

      Now more than ever, it has become more important to detect and interdict malware during the delivery phase. What can you do to defend your environment? What will threat actors do to step things up in 2017?

      Join Brendan Griffin, to learn about:

      •The evolution of malware and encrypted ransomware
      •2016’s most prevalent threats
      •Identifying the latest malware delivery tools and techniques
      •Developing a modern defense strategy and empowering your users
      •What to look out for in 2017

      Read more >
    • Malware Analysis: Let the Computer Do the Work!
      Malware Analysis: Let the Computer Do the Work! Thomas J. Quinlan, Malware Researcher Recorded: Jun 20 2012 1:00 pm UTC 49 mins
    • Malware analysts spend a lot of time analyzing code and looking for indicators of compromise from advanced persistent threats and even for the most seasoned analysts the volume of analysis can be prohibitive. In today's environment malware analysts need to leverage automated tools to power through large volumes of sample code and quickly receive valuable threat summaries.

      Letting the computers do the work allows the analyst to quickly identify files of greatest concern, and focus on remediating especially pernicious attacks. Malicious behavior can now be viewed right down to the kernel level, giving a complete picture of how your network was targeted by a specific cyber threat.

      Join Thomas Quinlan as he explores integrating automated threat assessment processes and defining indicators that identify specific threats to your system.

      Read more >
    • P2P File-sharing Crowd Sourced Malware Distribution
      P2P File-sharing Crowd Sourced Malware Distribution Anubis Networks, Threat Intel Researcher Recorded: Mar 16 2016 2:00 pm UTC 32 mins
    • BitTorrent is a very well-known protocol for large files distribution over the internet and it’s used by every industry from Linux distributions to copyrighted software and also for more questionable uses. Loved and hated by many, it is today unquestionably part of the internet landscape.

      With over 300 million users swapping files via BitTorrent every month, according to startup Tru Optik, with little or no supervision or control, it has also became an important target for malware distribution, explored by criminals worldwide, making both users as well as organizations victims.

      In this session we will present a research done by AnubisNetworks Labs team that shows how Bittorrent is an infection vector used by malware creators to compromise machines at a global scale, with minimum effort.

      We will provide a historic view concerning the P2P Networks evolution from the early players such as E-Mule, Napster, Kazaa; highligh the Bittorrent protocol and how it works. The methodology used in this research unveiled which applications and operating systems are more vulnerable but more importantly which botnets are more common shipped with torrents and what type of risk they pose to users and organizations.



      KEY TAKEWAYS

      · Why P2P file sharing is a security risk to both users and organizations

      · How malware is disseminated using different type of applications

      · Most common types of malware shipped with torrents

      Read more >
    • The State of Web Security: An Analysis of Common Malware Attacks
      The State of Web Security: An Analysis of Common Malware Attacks Kowsik Guruswamy, CTO of Menlo Security Recorded: Oct 14 2015 3:00 pm UTC 38 mins
    • There are now more than 1 billion websites in existence, with more than 100,000 additional ones created every day. The Web is the primary attack vector for the vast majority of malware.

      Join Kowsik Guruswamy, CTO of Menlo Security, as he presents the findings of a recent study on the security vulnerabilities of the world's most popular websites.

      This webinar will cover:
      - A review of the findings of a recent Menlo Security Vulnerability report into the top 1m website and their security vulnerabilities.

      - An analysis of the current state of web security, it's evolution and why it is not effective in blocking modern malware attacks.

      - An introduction to the concept of "Isolation Security'.

      - A demonstration of the innovation Menlo Security Isolation Platform, illustrating how to eliminate web-borne malware.

      Read more >
    • Malware Attack "Fan-out" Effect in the Cloud
      Malware Attack "Fan-out" Effect in the Cloud Krishna Narayanaswamy, Founder and Chief Scientist, Netskope Recorded: Jun 21 2016 5:00 pm UTC 60 mins
    • The rapid rise in cloud adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

      Join Krishna Narayanaswamy, Founder and Chief Scientist of cloud security company Netskope, as he takes an in-depth look at data breaches involving cloud services and how they come about. Krishna will take a fun, CSI-like presentation approach and draw upon unique, anonymized data seen in the cloud to illustrate:

      - The multiplier effect that that the cloud can have on the probability of a data breach
      - Three real-world examples in which the cloud can play a role in data breaches, including a step-by-step review of a recent exploit found in a cloud storage app
      - How to identify data breaches in an enterprise cloud environment using advanced anomaly detection techniques
      - A forensic walk-through in the reconstruction of a complex audit following a data breach
      - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud

      Read more >
    • Catch Advanced Malware That Evades the Typical Sandbox
      Catch Advanced Malware That Evades the Typical Sandbox Anne Aarness, Senior Manager at McAfee Recorded: May 13 2014 5:00 pm UTC 37 mins
    • Many vendors are rushing to bring malware protection systems to market, but today’s advanced malware is stealthy and can often evade these systems. Organizations need a more comprehensive approach that looks beyond behavior seen in the sandbox, uncovering the hidden danger in malware's latent code.

      Anne Aarness, Senior Manager at McAfee, explains how McAfee Advanced Threat Defense combines in-depth static code and dynamic malware analysis for a comprehensive malware protection system. Combined, this represents the strongest advanced anti-malware technology in the market, and effectively balances the need for both security and performance.

      Read more >
    • Disrupting Attacks with Email, Web, DLP, and Advanced Malware Security Solutions
      Disrupting Attacks with Email, Web, DLP, and Advanced Malware Security Solutions Daniel Flaherty, McAfee Product Marketing Manager Recorded: May 27 2014 4:00 pm UTC 39 mins
    • Businesses today face more advanced attacks than we’ve ever seen in the past – and defending against them takes a connected approach which can disrupt the multiple points of infiltration and exfiltration used in the process of a breach. With most attacks seen in the wild using phishing emails to reach their target, a web link or malicious file to deliver a payload, and an outbound stream of communication to exfiltrate data – implementing a Secure Email Gateway, Secure Web Gateway, Advanced Anti-Malware, and Data Loss Prevention technology together will provide a barrier difficult for even the most advanced attacks to overcome.

      Don’t miss this webinar if you have a stake in the security of your most valuable information, or are directly responsible for the implementation of security solutions to protect it.

      Read more >
    • Safely Enabling the Cloud in a World of Malware and Data Breaches
      Safely Enabling the Cloud in a World of Malware and Data Breaches Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope Recorded: Apr 12 2016 5:00 pm UTC 61 mins
    • Cloud adoption is quickly becoming a must-have for enterprises, as organizations clamor to exploit the cost savings and increase in collaboration and productivity that are now established benefits of many cloud apps But at the same time, this rise in adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

      Attend this webinar with Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope for a spirited discussion that will explore the following:

      - Trends in the market related to cloud adoption and the steps being taken to address security concerns;
      - How to securely enable the use of cloud services for enterprise employees;
      - A “how to” for identifying data breaches in an enterprise cloud environment using advanced anomaly detection techniques;
      - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud.

      Read more >