US Colonial Pipeline attack: Everything you need to know
Colonial Pipeline is the largest oil product pipeline operator in the United States, and the recent Ransomware attack forced shutdown of all their operations.
This cyber attack is just the latest in a long series of serious ransomware and malware attacks, and we can’t help but envision a world in the not-too-distant future where ransomware attacks impact all our daily lives. Ransomware is booming and now targeting all kind of industries, including critical infrastructure, healthcare and government.
Participate in this webinar to learn more about this recent attack, how it unfolded, its impact and what your organization can do to prevent such cyber-attacks.
RecordedMay 25 202138 mins
Your place is confirmed, we'll send you email reminders
Lee YK, Sangfor Industry Solution Expert and Consultant.
CIOs are leading the C-Suite digital transformation acceleration trends, forcing other C-Suite members to optimise and transform. CIO's are increasingly looked too to enable an organisation for future success.
Cloud adoption is essential to the process of digitisation, but how can you make a cloud transformation as simple as possible? It is essential consider several elements of this process before you can choose the right technology for your cloud transformation journey. Join Sangfor experts in a candid discussion of the right technology to use to enable critical cloud adoption in 2021.
Weaponized AI is becoming a major threat, with cyber criminals leveraging AI to make cyber-attacks more effective and more disruptive, circumventing many threat detection technologies available on the market. While the best way to overcome this threat is to use AI, generalized AI models often result in a large number of false positives or false negatives, making it ineffective against weaponized AI.
Sangfor recently released a whitepaper co-hosted with a Gartner research focus on AI for malware detection, that provides a brief overview of how Sangfor Cyber Command NDR platform utilizes purpose-built AI models to combat weaponized AI, and the primary threat hunting use cases the AI models detect. Join us in this webinar to learn about these AI-assisted use cases to better protect your organization against current & future cyber threats.
Applications are playing a vitally important role in digital transformation. It is the driving force that moves business towards digitalization. We’ve been using all kinds of applications since the explosion of information technology, in businesses and daily life. The architecture of applications is also evolving to serve businesses of all kinds in accordance with technology advancement. From traditional monolith to distributed microservice, the difference in architectures defines the user experience, operability and availability of applications. That’s why it’s essential for IT decision makers to understand the value and benefits of the trending architecture for applications and choose the right application architecture for their businesses. Join us in this webinar to discover future of modern application architecture: microservice, and the value it brings to your business.
Francis Tsang. Senior Managed Cloud Operations Manager.
Cloud has become the foundation that enables businesses to transform, differentiate and gain competitive advantage. Many organizations are now focused on cloud-first strategies, using cloud services to drive business.
However, “Cloud first” does not always mean “Everything to Public Cloud!” or adopting a strategy to move all applications out of data centers.
Being cloudified is easy. Creating a sensible, high-performance, cost-effective and secure enterprise cloud presence, is not so easy. Let’s explore a “Cloud Smart” strategy, a smarter way to re-define cloud adoption.
The global pandemic has made Work from Home (WFH) the new normal. While staying at and working from home keep us safe from COVID-19, in the cyber world as long as there is internet, security threats never go away even if we lock ourselves in our room. Recent research shows that security risks driven by work from home are still rising. Join us and learn about critical security risks stemming from WFH, suggested best practices to minimize these risks, and how Sangfor security solutions help you deal with risks turned threats.
Tian Koon Lee. Manager, Global Business Solution Strategy
The concept of digitalization or Industry 4.0 has varying importance in existing manufacturing industries. During the global pandemic, some industries have embraced the concept and adopted digitalization, benefiting from more streamlined transactions, refined product delivery, and enhanced internal and external value chains, while others industries are struggling to encash the opportunities presented by digital transformation.
Join our webinar now to learn how Sangfor HCI enables manufacturers to build smart, modern and future-proof factories.
Ransomware has been an increasing threat for small to large organizations. Tune in to discover what our professional Incident Responders have seen over the past 24 months. We uncover a glimpse of ransomware attack trends, targeted APAC industries, malware types and infamous root causes that have lead to ransomware compromises. We will also show how our experienced IR team can help you be proactive instead of reactive against these notorious infections in the digital world.
Living in a digital world means information is always at your fingertips, residing in the applications on your phones, laptops and servers. As speed and availability of information access requirements get higher and more complex, applications must evolve to stay current.
Rapid changes in application architecture have seen applications morph from more traditional, monolithic applications with functional modules built into a single installation, to modern microsevice-based applications, that break into multiple installations, that more easily serve a wider user base. The future surely belongs to microservice-based applications, as unlike monolithic applications that are designed to run on physical servers or VMs, micro-service applications can be run on containers, and are managed by Kubernetes (K8s in short). To build, run and manage container-based microservices, you will certainly deal with K8s.
As the first graduated open-source project from CNCF, K8s are the core of the platform-as-a-service that provides automation and orchestration for micro-service applications. Many tools like Jenkins and Istio are built around K8s, to facilitate simple and faster modern application development and management.
As a long-time IaaS (HCI & SCP) player in the market, Sangfor dedicated an increasing amount of resources to PaaS development several years ago. Why are K8s so popular? And what is Sangfor’s role in the PaaS world? Join our Sangfor expert-led webinar to learn more!
Ransomware is one of, if not the biggest blight in this digital age. Many organizations are concerned about the negative impact a single ransomware attack will have on them and are doing all they can to prepare and to protect themselves for the eventual attack. However, while there are many variants of ransomware being developed every day, there are always telltale signs that can give you early warning of a ransomware threat coming your way.
Join us and learn how you can identify these early warning signs with Sangfor’s Network Detection and Response platform, Cyber Command.
We are in a constant state of virtual warfare, as threat from weaponized computer programs continues to increase steadily, raise its intelligence level, and stoop to new lows to take advantage of the digitally challenged. According to a recent study by IBM Security, data breaches cost the average company around $3.92 million, made possible by the average of 279 days businesses take to detect a data breach.
Cloudification and Network Optimization have simultaneously expanded, with more than 75% of organizations indicating they are employing a cloud-first strategy, as reported by Gartner, giving businesses the tools to operate at a higher level – and giving cyber criminals the tools to penetrate and manipulate faster and easier than ever before. It is time to stop looking back at the grim statistics of 2020 and look forward to the trends of 2021. The Gartner report "Top Strategic Technology Trends for 2021" tells us that COVID-19 has disrupted the way organizations are working and must transform to meet trends such as remote work.
Lee YK, Sangfor Industry Solution Expert and Consultant.
Data protection and operational up-time are of critical importance since the pandemic, yet a recent study of over 500 C-level executives discovered that almost 80% of small and medium sized businesses have no data backup or disaster recovery (DR) plan in place. These networks are incredibly vulnerable to hardware failure, human error and malicious attack.
Failure to plan, is a plan to fail. There are several considerations you must take into account when choosing and deploying a disaster recovery plan. Plan for the future safety of your organization now.
The US Supreme Court ruled that interpretation of the United States Computer Frauds and Abuses Act of 1986 (CFAA) related to anyone who "intentionally accesses a computer without authorization or exceeds authorized access," was too broad and overreaching. Thus, anyone who has authorized access to computers and data cannot be held criminally liable for misuse of those resources or data. This now makes it very difficult for organizations to prosecute insider threat attacks. Organizations now need to implement and enforce ZTNA to ensure no one has more access than they need to resources or data. ZTNA limits and audits authorized access making it easier to take action against inside attackers.
In this webinar, we will discuss the US Supreme Court decision, how it affects you and how ZTNA can help you protect against insider threats.
Francis Tsang. Senior Managed Cloud Operations Manager.
The pandemic has dramatically changed our lives, and the global business landscape. Customer behavior has also experienced an permanent shift. This means that organizations need an enhanced their approach to transformation, to ensure they have the agility to reinvent themselves in extraordinary times.
Sangfor is here to show you how to break down silos and drive digital transformation with optimal TCO control, while debunking myths of the complexity of adoption of emerging technologies. Cloud Computing as-a-service suits application needs and secures data, making your network agile yet focused, and helping put strategies in place that can evolve quickly, and deliver growth in this post-pandemic era.
While traditional WAN topographies are still widely in use, they cause several issues to organizations focused on securing branch offices.
• Multi-point solution increases O&M complexity & cost
• Lack of end-to-end security visibility
• Difficulty defending against advanced persistent threat targeting branch offices
Branch offices are often the weakest link in your strategic cyber defense plan, yet vital to organizational level network security protection. An unexpected cyber-attack could launch your business, head-first, into the worst-case scenario, making the creation of an incident response plan a critical part of your business continuity plan.
Join Sangfor experts for today's webinar covering:
• Managing branch offices effectively & securely
• Offload SecOps to a trusted managed service provider
• Incident Response best practices
Tian Koon Lee. Manager, Global Business Solution Strategy
IT infrastructure is a vital part of any size business, and has a huge impact on operations and company success. It’s vital to have a secure and efficient infrastructure to keep up with constant changes in business, technology and best practices. Upgrading your IT Infrastructure can be a daunting task. How do you know when it’s the right time to upgrade, and how to get started? Join Sangfor experts for a webinar, where we will conduct an in-depth discussion of warning signs that it’s time to consider upgrading your company IT. Sangfor HCI is the solution you need to effectively build a simple, secure, reliable and cost-efficient IT infrastructure for your business.
Cyberattacks occurs every 39 seconds globally and many are successful. Data breaches continue to affect hundreds of millions of customers causing them to lose trust in the businesses where personal information was compromised. It is vital for executives, managers, and line personnel to understand how data breaches occur and what can be done to prevent them.
In this webinar, we will revisit some of the most interesting recent data breaches and discuss lessons learned to better protect your organization from them happening to you.
Today’s cybersecurity landscape is dire: externally, innumerable attackers with sophisticated skills and weaponized AI, and internally our cyber assets growing rapidly while becoming more difficult to protect. Unfortunately, even though most organizations use traditional architectures with best-of-breed products to build their defenses, the results are often insufficient. As good as best-of-breed products are, they do not integrate well. Breaches happen constantly, ransomware still gets through, and worse the security team is often reactive and has difficulty identifying the root cause of an event, let alone develop a strategy to prevent it from happening again. A closed-loop system is need where security products are integrated directly to better identify new AI-based threats and coordinate response against them.
Sangfor NGAF is the foundation for building a proactive closed-loop security solution. Sangfor not only offers world-class battle-tested security protection but provides a straightforward way to identify and manage the sprawl of cyber assets, detect account abuse, and discover malicious processes and connections on critical business assets. Preemptively eliminate threats before they do damage.
Join this session to see how Sangfor NGAF works together with Endpoint Secure, and Platform-X to build a dynamic proactive closed-loop defense against today’s advanced cyberthreats.
In the governance of network security, we can isolate and deal with cyber threats with obvious symptoms, but it is hard for us to find the root cause of asymptomatic threats, so extermination cannot be guaranteed. If you lack the ability to hunt Patient Zero, the weaknesses in that system will always be the entry point for future threats. If you cannot detect an asymptomatic hidden threat, it can spread across the network and gradually open other breaches until your organization suffers the same kind of security incident again and again. According to the IBM 2020 Cost of a Data Breach Report, the average total cost of a data breach reached 3.86M USD, and the average time to identify and contain a breach increased globally from 197 to 280 days. If asymptomatic hidden threats are already inside your network, how do you stop them before they cause damage to your business? How do you avoid reinfection by same virus? Join us and find out how to locate asymptomatic infection and Patient Zero.
Sean Wang - Sangfor Country Manager of Malaysia; Guy Rosefelt - Sangfor Security CMO
We are in a constant state of virtual warfare, as threat from weaponized computer programs continues to increase steadily, raise its intelligence level, and stoop to new lows to take advantage of the digitally challenged. According to a recent study by IBM Security, data breaches cost the average company around $3.92 million, made possible by the average of 279 days businesses take to detect a data breach. Many organizations had to accelerate digital transformation strategies that were to take 3-5 years to virtually overnight in some cases to maintain business continuity but without the ability to do any real security planning. Remote work means unique operational challenges to provide a seamless experience for remote and local users while meeting the security needs of organizations. It is time to join Sangfor in the year 2021.
Join Sangfor Technologies on the road, to learn about the most cutting-edge solutions for network security, cloud computing, and network optimization – and see how your organization can achieve truly inspired next-generation security and optimization.
Live & On-Demand Webinars Focus on Cyber Security & Cloud Computing.
Sangfor Technologies is a leading vendor of Network Security, Cloud Computing and Infrastructure solutions. Our Webinar Series are designed to educate current & new customers about the Latest Trends in Cyber Security & Cloud Computing. Stay tuned for more information about our upcoming webinars by visiting our website at www.sangfor.com.