2018 Threat Report and Top Malware

If there’s one thing that came through loud and clear in Webroot’s analysis of malware and other threats in 2017, it’s that, when it comes to cybersecurity, change is the only constant. While analysts, researchers, and security companies worked quickly to identify and block emerging threats, attackers were just as quick in finding new ways to evade defenses. Join this Channel Futures webinar to learn more about the discoveries and analysis of threat activity throughout 2017, the top malware of 2017 and how to be better equipped to overcome modern cybercrime in 2018.
Watch Now

Spotlight

The Higher Education Information Security Council (HEISC), along with EDUCAUSE and Internet2, held its annual Information Security Awareness Video & Poster Contest, an event that allows college students to win prizes, gain experience, and earn recognition by creating a PSA about information secu


OTHER ON-DEMAND WEBINARS

Extend your Attack Surface Coverage with No SIEM Required

Alert Logic

Attend this webinar to learn about new capabilities that Alert Logic has added that extends attack surface coverage for Endpoint, Multi-Cloud, and Dark Web. Get broader detection and response for less effort and lower cost with no SIEM required.

Top 10 Zero-Day Exploits

Palo Alto Networks

Despite the continuous advancements in cyber security in 2015, most organizations remain entirely exposed to targeted cyber-attacks that leverage zero-day exploits. The traditional antivirus and endpoint security solutions are no longer effective. How can organizations prevent security breaches that utilize unknown and zero-day exploits?

How I Learned to Stop Worrying and Embrace the Deep Dark Web

"When people read about ""Tor and the deep web"" in the media, it's usually referring to the black markets selling illicit drugs, stolen credit card data, illegal weapons and more. However, increasingly Tor and other anonymous proxies are also being used to conceal threat vectors. This increasing use of Tor and similar technologies presents continuing challenges for IT security departments. Aside from the obvious attacks originating from the tor network, advanced malware is also using Tor to obfuscate C&C (command and control) channels, making it harder to detect, contain, and eradicate this malware in your environment. In this second part of our series on Tor and the deep web, we'll explore these issues and discuss strategies you can use to help mitigate the risks of such technology"

Beyond Buzzwords, Part III: What Is Defense in Depth?

Defense in depth is another one of those often-used, but rarely-defined, terms in Information Security circles. Sure, it means a layered defense, that’s obvious. But what makes up the layers? How do they interact for better security? And what does a best-practice implementation look like today vs. even a few years ago?