Hi [[ session.user.profile.firstName ]]
Sort by:
    • Prevention Week Part 2: Defeat Zero-Day Exploits by Automating Prevention
      Prevention Week Part 2: Defeat Zero-Day Exploits by Automating Prevention Michael Moshiri | Director, Advanced Endpoint Protection at Palo Alto Networks Recorded: Jul 19 2016 5:00 pm UTC 61 mins
    • Your endpoint security should easily prevent known threats. But can it also prevent unknown threats from compromising your environment? More importantly, can it automate this prevention so you don’t have to assign scarce resource to investigate alerts?

      In this webinar, you’ll discover a revolutionary approach to defeating zero-day exploits. We’ll examine current approaches to exploit prevention, discuss the top 10 zero-day exploits of 2015, and analyze unknown threats on the day they became known.

      You’ll learn:
      •How to future-proof your endpoint security to protect your users from unknown threats
      •Why other approaches to endpoint protection cannot prevent zero-day exploits
      •Which applications were targeted by the top 10 zero-day exploits discovered in 2015
      •How to automate threat prevention through a natively-integrated, next-generation security platform

      Read more >
    • Is SaaS Safe? SaaS Security vs Today’s Zero-Day Attack
      Is SaaS Safe? SaaS Security vs Today’s Zero-Day Attack Michael Landewe Recorded: Apr 27 2017 5:00 pm UTC 43 mins
    • Every day, we test popular SaaS like Office365 and GSuite against the latest zero-day threats.
      In this webinar we will answer the questions that CISOs regularly ask:

      • Which SaaS offer the best built-in protection?
      • Is it worth paying more for Microsoft's Advanced Threat Protection?
      • Is there a difference in protection between email and file sharing?
      • Should I scan both inbound and outbound? What about internal email and sharing?
      • How do I add more security if I need it?

      Avanan's Cloud Security Platform is uniquely positioned to understand the security profile of most every cloud provider. Integrated with all major SaaS and partnering with over 70 security vendors, Avanan constantly monitors for the latests security threats and measures the risk profile of each cloud provider.

      We will discuss recent attacks and the speed of each cloud vendor's response. We will compare each SaaS window of vulnerability and adaptation to the changing threat vectors.

      Before and after the webinar, real time vulnerability information will be available at https://avanan.com/gauge

      Read more >
    • How Bad Can Zero Days Get?
      How Bad Can Zero Days Get? Robert Hansen, VP of WhiteHat Security Labs Recorded: May 27 2015 5:00 pm UTC 38 mins
    • Are you giving the adversary unintended access through vulnerabilities in your system?

      By only having one method of finding vulnerabilities or one way of mitigating them, the chances of the adversary getting through are increasingly high. This webinar will walk you through the current threat landscape, how vulnerabilities can be found, and how to mitigate control.

      In this webinar you'll learn:

      - What types of assessments work at which points in the software development lifecycle.
      - What is the most popular way to deploy a WAF and why that's not a good idea as a single method of defense.
      - Why finding and fixing your vulnerability isn't actually good enough.

      Read more >
    • Zero-Day Attacks and What To Do About It?
      Zero-Day Attacks and What To Do About It? Chris Candaffio, System Engineer, Symantec Recorded: Mar 23 2017 5:00 pm UTC 32 mins
    • 5-Part Webinar Series: Endpoint Protection…what really matters?

      Part 3 of 5: Zero-Day Attacks and What To Do About It?

      All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.

      Join us to learn what can be done to block exploit attacks on day zero:

      • What behaviors and techniques are used to block attacks
      • Why exploit prevention plays a critical part in endpoint protection
      • How Memory Exploit Mitigation works

      Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.

      Register Today

      Watch On-Demand:
      • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

      • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

      Read more >
    • Zero Day, Zero Effect: Examining the Clandestine Wolf Zero-Day
      Zero Day, Zero Effect: Examining the Clandestine Wolf Zero-Day Ben Withnell, Incident Analyst, FireEye as a Service Recorded: Sep 22 2015 3:00 pm UTC 43 mins
    • Triage and remediation of attacks utilizing zero-day vulnerabilities requires technology, intelligence, and expertise that is often beyond the capabilities of most security teams today. With Clandestine Wolf, the name our security team gave to a recent zero-day campaign exploiting an Adobe Flash vulnerability, our analysts were able to validate the alert and begin response within minutes after first observing the attack.
      In this webinar Ben Withnell, a FireEye as a Service (FAAS) incident analyst, will discuss how the Clandestine Wolf campaign was discovered, triaged, and remediated across the FireEye as a Service customer base. Throughout the webinar he will also share his insights into how our analysts handle APT threats, the attacker lifecycle, and remediation tactics.

      Register today for this exclusive insight!

      Read more >
    • Stopping Zero-day Threats
      Stopping Zero-day Threats Dan Maier, Senior Director of Product Marketing, Zscaler Inc. Recorded: Jul 23 2015 3:00 pm UTC 56 mins
    • If Anthem, Sony, Home Depot, Target and Neiman Marcus can fall victim to security breaches, so can you. The bad news is - no company is immune, no matter how big or small you are. Without a proper understanding of zero-day threats, companies have no way of exposing the gaps of overhyped security solutions. These threats are very sophisticated and often leveraging previously unknown attack techniques and vulnerabilities.

      Join us for a compelling webcast that will highlight critical insights combating zero-day threats - including the ability to:

      • Track employee traffic at all times, in real time, irrespective of whether they are inside or outside the corporate network
      • Derive intelligent insights and meaningful data for fast corrective action
      • Avoid a strategy based on "alerting" you about infections - without any guarantees you will notice them
      • Implement a comprehensive approach to stopping zero-day threats - based on protection, (inspecting every byte of traffic and automatically blocking threats), detection and remediation

      Read more >
    • Preparing for Zero-Days and Emerging Threats - Where Effective Security Counts
      Preparing for Zero-Days and Emerging Threats - Where Effective Security Counts Joanna Burkey,HP TippingPoint DVLabs Manager Recorded: Jun 24 2014 9:00 pm UTC 35 mins
    • Staying ahead of the bad guys requires two things: a good plan and a good partner. Your security plan must be robust, flexible, and responsive. Your partner must do the heavy lifting, so your team can concentrate to what matters most to your business. HP Security Research Zero-Day Initiative has more than 3000 security researchers looking for vulnerabilities in the software you rely on. Once they are found, HP TippingPoint DVLabs pushes out weekly digital vaccine packages to proactively protect customers from emerging threats.
      But staying protected isn’t just a numbers game.

      Attend this webinar to learn:
      • How we develop “virtual patches” that block any attempt to exploit the vulnerability rather than simple filters to block individual exploits
      • How our approach reduces false positives
      • How the HP Security Research and DVLabs team keeps them out to let you rest easier

      Read more >