InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Protecting The Network Edge from APTs, Zero Days, and Ransomware

Presented by

Wes Dobry, VP Solutions Engineering, Eclypsium

About this talk

An 8x increase in vulnerability exploitations against network edge devices was reported in the 2025 Verizon DBIR report. Attacks on the network edge have caught up with Credential Exploitation as an initial access attack method. Join this webcast for a mix of industry trends and practical tips to protect your enterprise from this seismic shift in attacker tactics. In this session we will cover: Why network device exploitation is on the rise as an initial access vector while credential abuse drops Which network device types are most attacked, and how to protect them How to find and patch vulnerable devices faster, and how to protect the ones you can’t patch
Eclypsium Cybersecurity

Eclypsium Cybersecurity

3905 subscribers50 talks
IT and AI Infrastructure Security
Eclypsium is the industry’s leading IT and AI Infrastructure Supply Chain Security company. Eclypsium defends enterprises and government agencies from vulnerabilities and supply chain threats hidden within hardware and firmware that traditional EDR and VM solution's miss.
Related topics