Embedded Security: the who, what and why they attack
Join Polyverse CTO Archis Gore and VP of Sales Ron Nixon as they talk through embedded security. Learn who the attackers are, why they attack and how to defend against them.
RecordedJan 26 202134 mins
Your place is confirmed, we'll send you email reminders
Archis Gore, CTO Polyverse; Ron Nixon, VP Sales Polyverse
Join Polyverse CTO Archis Gore and VP of Sales Ron Nixon as they talk through embedded security. Learn who the attackers are, why they attack and how to defend against them.
Learn how to secure Kubernetes in this technical webinar. Mike goes through a demo on creating your Polymorphic Kubernetes cluster as well as secured containers.
Find out how you can secure your Linux systems against memory exploits and reduce the strain of patching on your IT team with Polymorphing for Linux. Join Pete as he explains more about this ground-breaking technology. Available for all versions of Enterprise Linux including Red Hat, SUSE, and Canonical (Ubuntu).
Ron Nixon is Vice President for Global Defense and Government at Polyverse, where he is responsible for Public Sector growth and engagement. Prior to Polyverse, Ron held senior technical management and CTO roles with General Dynamics Information Technology (GDIT), CSRA and NES Associates where established and maintained IT and cybersecurity solutions and practices in customer enterprises for commercial, defense and government markets. Before that Ron served 23 years in the US Army conducting IT and cyber operations for Joint, Special and Conventional operators.
Rui Maximo, Director of Solutions Engineering & Archis Gore, CTO
Learn more about:
•What is a Fileless Attack and why is it so dirty?
•What are some common counter measures, and why don’t they work?
•DEMO 1: NGINX Attack – see an exploit circumvent all the common countermeasures
In this webinar learn about:
• The true business impact and cost of the ransomware pandemic
• Typical ransomware tactics
• What can you do about it?
• How to detect cyber-criminal activity
Rui Maximo, Director of Solutions Engineering & Archis Gore, CTO
Join us for a technical deep dive on:
- What is a Fileless Attack and why is it so dirty?
- How exploits circumvent common countermeasures
- DEMO 1: NGINX Attack – see an exploit circumvent all the common countermeasures
- Polymorphing for Linux and Open Source
- DEMO 2: SSH Attack: exploiting a buffer overflow – watch a live attack without Polymorphing, then with Polymorphing.
- Deep dive on Polymorphing and the underlying technology
- DEMO 3: See a live Boothole vulnerability attack then we’ll disassemble and analyze a Polymorphed program
Rui Maximo, Director of Solutions Engineering & Archis Gore, CTO
Learn more about:
•What is a Fileless Attack and why is it so dirty?
•What are some common counter measures, and why don’t they work?
•DEMO 1: NGINX Attack – see an exploit circumvent all the common countermeasures
Find out how you can secure your Linux systems against memory exploits and reduce the strain of patching on your IT team with Polymorphing for Linux. Join Alex as he explains more about this ground-breaking technology. Available for all versions of Enterprise Linux including Red Hat, SUSE, and Canonical (Ubuntu).
Join Pete Jarvis VP of Business at Polyverse where he reviews the state of cloud security for Linux Applications and what you can do to secure your critical data and systems when moving to the cloud.
Rui Maximo, Director of Solutions Engineering, Polyverse
Join Rui Maximo as he and Dan Elder from Novacoast give insight into how Polyverse and SUSE are providing an innovative way of helping protect government and enterprise customers against zero-day attacks.
Join Pete Jarvis VP of Business at Polyverse where he reviews the state of cloud security and what you can do to secure your systems when moving to the cloud.
Polyverse develops leading-edge cybersecurity technology which protects Linux systems against all memory-based exploits by stopping attacks, before they start. Polyverse technology is widely deployed by government and enterprises both on-premise and in the cloud as well as embedded into edge devices and end point solutions to provide the ultimate protection against hackers.
Embedded Security: the who, what and why they attackArchis Gore, CTO Polyverse; Ron Nixon, VP Sales Polyverse[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]34 mins