How to Detect Cryptomining in your Environment with AlienVault

Logo
Presented by

Danielle Russell, Group Product Marketing Manager & Amy Pace, Principal Product Marketing Manager | AlienVault

About this talk

Cryptominers are built to turn computing power into revenue. To make cryptomining a profitable venture, cyber criminals are writing and distributing malware to steal computing resources to mine for cryptocurrencies like Bitcoin and Monero by attacking victims' endpoints, public cloud accounts, and websites. Through various attack vectors, cyber attackers can turn compromised systems into a silent zombie army of cryptocurrency miners. Unless you have advanced threat detection capabilities to detect crypto-mining activities on your endpoints, in the cloud and on premises, you might be unknowingly sharing your valuable computing resources with cryptomining criminals. Join this webcast to learn: - The what, why and how of cryptomining - How cryptomining can evade traditional antivirus and other security controls - Best practices and essential tools for detecting cryptomining quickly - How AlienVault Unified Security Management (USM) can alert you immediately of cryptomining activity Speakers: Danielle Russell, Group Product Marketing Manager Amy Pace, Principal Product Marketing Manager
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (32)
Subscribers (72193)
AT&T Cybersecurity’s edge-to-edge technologies provide phenomenal threat intelligence, collaborative defense, security without the seams, and solutions that fit your business. Our unique, collaborative approach integrates best-of-breed technologies with unrivaled network visibility and actionable threat intelligence from Alien Labs researchers, Security Operations Center analysts, and machine learning – helping to enable our customers around the globe to anticipate and act on threats to protect their business.