10 Incredible ways you can be hacked through email and how to stop the bad guys

WorkCast

Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us and Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, we'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.
Watch Now

Spotlight

Secure access to your APIs by applying the API Key Authentication and CORS policies in API Connectivity Manager. API owners can configure the policy using the user interface or Admin API. Now API consumers can generate app credentials and test APIs using the developer portal.

OTHER ON-DEMAND WEBINARS

DevOps with Simulation

Are you considering using simulation to develop and test your software or applications? Make continuous integration and DevOps possible for embedded development. Find out how to: Provide a 24/7 automated test lab for your entire team Increase test automation by 12,000% Achieve 30% faster testing
Watch Now

How DNS-Based Attacks Operate from the Inside Out, and How to Defend Against Them

Infoblox

The Domain Name System (DNS) plays a critical role in modern network connectivity. Unfortunately, it is also a central part of many cyber-attacks as DNS is involved in more than 90% of malware/ransomware and nearly half of all data exfiltration incidents. So how exactly how do cyber-criminals use DNS to carry out attacks? In this webinar we will examine the many ways cybercriminals exploit the unique properties of DNS.
Watch Now

Modern Data Storage for Cyber Security Recovery

In the event of a security breach, are your backups secure and ready to get you back in business? At this exclusive session, we’ll showcase how Pure Storage can protect your backups in the event of a cyber security breach – and get you back to normal operations, faster than any other solution available today.
Watch Now

Top 5 Reasons Hackers Want Your Employees’ Mobile Devices

Zimperium

While most organizations are realizing that they need to protect their employees’ mobile devices in order to protect confidential corporate data, some companies try to remain blissfully naive to the hacking opportunities smartphones and tablets present. Given the ever-growing use of mobile devices and the number of mobile cyberattacks, companies can no longer plead ignorance to these mobile threats.
Watch Now

Spotlight

Secure access to your APIs by applying the API Key Authentication and CORS policies in API Connectivity Manager. API owners can configure the policy using the user interface or Admin API. Now API consumers can generate app credentials and test APIs using the developer portal.

resources