2015: The Year of the Flash Zero-Days

Malwarebytes

Throughout 2015, there seemed to be a never ending exploit of Adobe Flash. Every time a patch was released, cybercriminals found another security hole. And IT admins everywhere struggled to keep pace with the patches.
Watch Now

Spotlight

By using social engineering, cybercriminals, hackers, and other bad guys can get around the security systems that are in place to keep them at bay. Instead of hacking the system, they’ll hack the human, which is considerably easy. The infographic below presents the 3 main types of social engineering attacks, breaking down the main tactics used for each type.


OTHER ON-DEMAND WEBINARS

Exploring the Current State of Cybersecurity in the Legal Sector

BitSight Technologies

Despite the fact that third party breaches have been on the rise, organizations may not be doing enough to manage the cybersecurity of all of their critical vendors. Law firms, in particular, are one of the most widely used third parties, yet the Legal sector may be getting overlooked in vendor security discussions. In fact, the latest BitSight Insights Industry Index report revealed that although companies in the Legal sector have high security ratings and low rates of vulnerabilities, the industry remains a key target for cyber criminals. Therefore, it’s crucial for organizations in this space to understand their cybersecurity posture and improve their vendor risk management techniques.

Ransomware: The Billion-dollar Innovation Industry

KnowBe4

Since ransomware exploded on the scene, the bad guys are constantly coming out with new versions of ransomware strains to evade detection. Having earned a billion dollars in 2016, they have the resources to keep innovating and now ransomware is being leveraged in ways it has never been before.

DEMYSTIFYING END POINT SECURITY AND GLOBAL THREAT INTELLIGENCE

Dimension Data

The challenge of most organizations is turning threat intelligence data from multiple sources into actionable, contextual information that can be utilized quickly and efficiently. This ISACA educational, cybersecurity webinar will focus on this integration of threat intelligence data within Security Operation Centers to improve threat detection, response and even predict future threats. The thought-leadership will also include key insights on end point security.

Heartbleed, Bash Bug and Poodle: What we learnt from the Big Three in 2014!

"In April, one fairly minor vulnerability - Heartbleed - sent the IT community reeling. Since then we’ve had Shellshock/Bashbug and Poodle. 2014 was a year of high profile cases that effected massive changes in the IT community - and the lessons learnt should stay top of mind."

Spotlight

By using social engineering, cybercriminals, hackers, and other bad guys can get around the security systems that are in place to keep them at bay. Instead of hacking the system, they’ll hack the human, which is considerably easy. The infographic below presents the 3 main types of social engineering attacks, breaking down the main tactics used for each type.

resources