Becoming a Threat Hunter in Your Enterprise

For years, most IT security organizations have waited to detect new threats and  then moved swiftly to defend against them. Today, however, there is a new wave  of “threat hunting,” in which the security team takes a more proactive approach --seeking out potential threats before the attackers have a chance to act. How do enterprises build threat hunting programs? How do they staff them, and what tools do they need? What skills and training does a great threat hunter need? In  this Dark Reading webinar, a top expert discusses the process for building a threat hunting program, and for optimizing the efforts of designated threat hunters in the organization.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Information is power: The role of threat intel in cloud security

Cloud security is complex. Join Omdia’s expert cybersecurity analysts as they discuss the complex nature of cloud security and provide insights into everything from threat intel and SaaS to infrastructure- and platform-as-a-service, customer responsibilities, emerging trends, and the kinds of tools available to help.
Watch Now

Achieving Improved Cybersecurity Posture Across IT & OT Infrastructures

Forescout

Device Visibility has become the key to success for security practitioners when it comes to securing an increasingly more dispersed organisation with multiple data centres, distributed campuses and a mobile workforce. Now, smart devices are connecting previously separated IT and OT networks to automate business operations and boost efficiency introducing another layer of complexity. In this webinar, we will look at the concept of why device visibility poses such a challenge for business, what is getting in the way and why OT and IT convergence has added an extra consideration.
Watch Now

Under the Radar – The Future of Undetected Malware

Malwarebytes

The future is not full of easy to detect junkware, but hard to remediate and dangerous malware. Cybercriminals are becoming more sophisticated and adopting anti-forensic techniques that evade defenses with hard to remediate malware, like fileless attacks. Watch our webinar and learn about: The future of undetected malware. The latest and hardiest threats to remediate like Sam Sam, Sorebrect, Emotet and TrickBot. How prominent cybersecurity vendors cannot protect you from these threats.
Watch Now

Intelligent API Cybersecurity, Is Your Agency Protected?

Carahsoft

As government agencies move towards digital transformation, Cyber threats are getting smarter, using social engineering, brute force methods, and even artificial intelligence (AI) to bypass common defenses to gain access to these critical systems and data. To help protect Federal Agencies against an ever-diversifying landscape of cybersecurity threats, Axway and Ping Identity have formed a global partnership to deliver a comprehensive Application program Interface (API) security solution that optimizes security at all levels, from network to application.
Watch Now