InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Edge of Catastrophe: How Network Device Attacks Became The Biggest Cyber Battleground

Presented by

Paul Asadoorian & Chase Snyder

About this talk

F5's source code leak underscored a critical reality: thousands of organizations run vulnerable edge devices that attackers are actively exploiting. Combined with Cisco ASA compromises, the RedNovember campaign, and recent CISA emergency directives, network infrastructure has become the most active battleground in cybersecurity. These attacks succeed because most organizations can't see what's happening on their routers, VPNs, and firewalls. Attackers exploit this blindness to maintain hidden access for months, enabling data theft and ransomware deployment. This webinar delivers immediate, actionable defense strategies: - Which devices and firmware versions are being targeted right now - The specific monitoring gaps attackers exploit to stay hidden - Detection rules and log sources you can implement today - A prioritized checklist to find and stop active compromises
Eclypsium Cybersecurity

Eclypsium Cybersecurity

4122 subscribers52 talks
IT and AI Infrastructure Security
Eclypsium is the industry’s leading IT and AI Infrastructure Supply Chain Security company. Eclypsium defends enterprises and government agencies from vulnerabilities and supply chain threats hidden within hardware and firmware that traditional EDR and VM solution's miss.
Related topics