Referral Logs: The Secret Weapon to Combat Phishing Attacks (Part 2)

Logo
Presented by

Abhilash Garimella, Head of Research @ Bolster

About this talk

Phishing attacks are on the rise, organizations need to find more ways to combat attackers. In this part two of our “Secret Weapon to Phishing” series, a little-known secret to protect organizations is referral logs. Referral logs are a part of your web server's log that tracks the traffic to your site and through analysis, organizations can gain valuable insight into the activity on a site, including which pages are accessed the most, the average length of a session, and more. Join us for this webinar to learn more about how referral logs can be used to combat phishing attacks where Abhilash Garimella, Head of Research at Bolster, covers: • Attacker techniques and strategies that are caught by referral logs • Deployment tips to enable referral logs in your organization • Best ways to analyze referral logs to detect and then take action on phishing activities • Real-world examples of how referral logs have been used to combat phishing attacks and protect your sensitive data
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (19)
Subscribers (2603)
Thought provoking webinars featuring cybersecurity subject matter experts discussing recent trends on generative AI, information security, phishing attacks, threat intelligence, large language models, trademark infringement, online scam and fraud, SecOps excellence, dark web insights, brand protection, and more! The channels is educational for for CIOs, CISOs, S/VPs, Directors, Managers, Architects, Engineers, SecOps and Analysts in Security and IT.