Tracking attackers. Why attribution matters and how to do it

In this BHIS webcast we cover some new techniques and tactics on how to track attackers via various honey tokens.  We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst. We also cover some of the legal ramifications involved in do this. I am covering this for a couple of reasons. First, there are a lot of companies who are selling cyber deception in the form of honeypots, which is cool – but not near enough for attribution. Also, it is time to start gearing up for Black Hat.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Adopting a proactive approach to security with Extended Security Posture Management (XSPM)

Don’t miss Omdia’s expert cybersecurity analysts as they discuss Extended Security Posture Management (XSPM), a new proactive approach destined to help organizations reevaluate security programs and investments, asses the effectiveness of their end-to-end security, and how to get the data needed to make better decisions on risk management.
Watch Now

Managed Detection & Response for Operational Technology (OT): A Roundtable for CIOs and Security Professionals

In 2023, more respondents to S&P Global’s 451 Research Voice of the Enterprise: Information Security Budgets and Outlook survey reported growth in spending for managed security services than any other area of the cybersecurity market. Managed Detection and Response (MDR) is a focus of much of this growth, to improve performance
Watch Now

This is Security: Nothing is what it SIEMs

Alert Logic

Companies of every size and across every industry need to have the solution to defend against cyber attacks. For medium-sized and budget-constrained companies especially – the array of security technologies and solution and the volume of cyber threats can make the challenge seem overwhelming. Organizations suffer trying to manage raw data, security events and false positive incidents with limited context, overworked staff, and a lack of threat landscape knowledge. There is a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM or expensive traditional security outsourcing vendors.
Watch Now

Stopping Email-Borne Threats Before They Spread

Mimecast

Your organization likely has extensive security protections for your inbound email from the Internet. However, as much as two-thirds of many organizations’ total email traffic is generated internally by users. And, of course, attackers know this. Are you inspecting your internal email with the same diligence as your inbound email? What about the emails being sent out to your partners, suppliers, and customers? Attend this webinar to take a step inside your organization’s entire email traffic to learn about: The latest techniques that attackers are using to target your users. How attacks are spread both internally and externally. Advanced security and automation to defend your organization from compromised users and internal threats.
Watch Now