InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Tracking The Cyber-Geography in The Russia Ukraine Conflict

Presented by

Paul Mockapetris, Chief Scientist at ThreatSTOP

About this talk

Cyberattacks are becoming increasingly harmful and more difficult to distinguish legitimate from nefarious correspondence. “Safe” IP space can be hijacked by attackers and new domains can be created in moments. Being vigilant in security is no longer sufficient. Watch this video as Paul talks a little more about the Russia-Ukraine Conflict and how ThreatSTOP is staying one step ahead of bad actors. Having a firewall or using a VPN is no longer enough for protecting your organization and information when searching websites or communicating with outside sources. Attacks are sophisticated and often include compromised credentials or re-routing of network traffic for decryption. To maximize your cybersecurity, you need to actively block known bad websites and the malicious IP addresses they resolve to. You can do this by enhancing the devices you already have in place for communications: your DNS service and firewalls. Intercept and stop the DNS lookups that malware uses to send data and receive instructions. Bolster this protection with dynamic network-level blockades of hostile IP address space. Want to learn more about geo-blocking and how ThreatSTOP can stop the threat before it stops you? Get in touch with one of our knowledgeable experts today. Join the community and let’s get you protected. We’re here to help and ready to answer your questions.
ThreatSTOP, Inc.

ThreatSTOP, Inc.

300 subscribers40 talks
Proactively block real-time cyber threats.
ThreatSTOP was started in 2009 with a mission: Give organizations of any size the same cybersecurity protection that Fortune 1000 companies have. Few companies have the resources to curate threat intelligence feeds and update network devices to block real-time threats. ThreatSTOP automates network security, converting the latest threat data into enforcement policies, and blocking attacks before they become breaches.
Related topics