10 Incredible ways you can be hacked through email and how to stop the bad guys

Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us and Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, we'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Navigating the IT Security Certification Labyrinth

udemy

Cybersecurity remains a top priority for IT teams, but how can you prepare you and your team with the right skills? One of the challenges in IT security is the complex web of 200-300 different IT certifications. How can you navigate the IT security certification labyrinth and identify the best pathway for you and your team?
Watch Now

Automating Cybersecurity Functions in Your Enterprise: A Dark Reading Webcast

Secureworks:

Organizations face tremendous challenges when trying to keep pace with the volume of cyber incidents they are seeing today. Information security leaders are looking to the benefits of security orchestration and automation to relieve the strain on their incident response teams. While the promise of orchestration is great, achieving success requires great care in choosing which processes and investigative actions to automate.
Watch Now

2021 Cybersecurity Market Evolution

Watch Damon Acton (RVP of IoT/OT Cybersecurity) and Preetham Naik (Director of IoT/OT Cybersecurity) from our Americas team dissect some of the latest cyber exploit trends and upcoming legislation that is going to dramatically impact the landscape of IoT and OT cybersecurity. They’ll also break down some of focus areas as we move into the new year by educating to give a solid foundational understanding to improve cyber resilience for critical infrastructure providers.
Watch Now

Your Resolution for 2018: Five Principles For Securing DevOps

Veracode

Organizations in today’s market must strike a balance between competitive differentiation and meeting evolving compliance standards-particularly related to software security. They need to obtain faster release and deployment cycles, improved collaboration between business stakeholders and application development and operations teams, and automation tools. DevOps, an innovative organizational and cultural way of organizing development and IT operations work, is addressing this challenge – driven by mounting evidence of its benefits to the business. However reaping these gains requires rethinking application security to deliver more secure code at DevOps speed.
Watch Now