A Look at the WannaCry Aftermath and Ways to Prevent Recurrences with IBM MaaS360 with Watson

ON24

The WannaCry ransomware attack has come – but not yet gone – as organizations continue to struggle with its destructive fallout across 150 countries and over 200,000 endpoints. A hard lesson learned: this massive threat was wholly preventable. Moving forward, enterprises need the right hygiene and tools to shield their endpoints and users. They need cognitive unified endpoint management (UEM). Join us for the latest about the WannaCry cyberattack and learn how IBM MaaS360 with Watson can help your organization prevent future threats to its endpoints through: Regular patching and endpoint hygiene.
Watch Now

Spotlight

"APT attacks have led to highly visible security breaches at Target and other well-known organizations. This whitepaper explores three approaches for combating the critical APT lifecycle stages - protect, detect and remediate. The whitepaper also highlights how multi-tenant cloud solutions are better equipped than appliances in providing protection against APT attacks."


OTHER ON-DEMAND WEBINARS

How do you REALLY Know if Your DDoS Protection Solution will stop a DDoS Attack?

So you’ve purchased a DDoS protection solution. You’ve installed it according to the vendor’s recommendations. Sigh of relief…you’re feeling more secure already. But there’s a nagging thought in the back of your mind …“How do I REALLY know if my DDoS protection solution will stop a complex DDoS attack?” The answer is certainly NOT "wait and see." The best practice is to simulate the attack vectors of a real DDoS attack as accurately as you possibly can, to put your technology and process to the test - before a real attack occurs. Join Arbor Networks, the leader in DDoS attack protection products and services and Security Compass, a leading DDoS attack simulation and security consulting company – to see how you can use DDoS attack simulation to test the various layers of your DDoS protection solution. This webcast will cover: - A variety of DDoS attack types simulated to show you how they impact a network - What patterns and information you should expect from a mitigation device in action - How to convert your learnings into actionable guidance for your DDoS attack response plan

Data-centric Security & Encryption: Keeping Your Critical Data Safe

Data’s coming at us at a pace never before imagined. Without data-centric protection that secures your sensitive information throughout its entire lifecycle, you’re at risk. The use of data-centric security and encryption solution from HP Atalla and HP Security Voltage can help you rest assured that your data remains inaccessible, even if captured, lost, or stolen. Data breaches are inevitable – get prepared. Join this webinar to learn how to best protect your structured and unstructured data at rest, in motion, and in the cloud. Data-centric security will help you neutralize the potential damage from security breaches

The Trojan Horse inside the Trojan Horse: Tackling C2 Communications

AnubisNetworks

The Trojan Horse inside the Trojan Horse: Tackling C2 Communications. Understand AnubisNetworks’ Cyberfeed service, and how it may help your organization to support your threat intelligence program. 2.Understand how to use Cyberfeed to trace back an infection and understand its behavior. 3.Answer these questions: What’s happening in country X and network 000.000.0.0/00? How is botnet XPTO spreading? Can send me the report of Y every day at 7 am? Can I get a report for ASN Corporation Z?

How to Outmatch Data Security Challenges with Cost-Effective, Practical Strategies

IBM

Today’s threat landscape requires businesses of all sizes to gain visibility and control over sensitive data in order to comply with a tangled web of security and privacy requirements. Addressing insider threats and defending intellectual property, customer data and other confidential information across hybrid and multi-cloud environments can overwhelm even the savviest of security and IT teams, especially when resources are scarce. However, data security defenses don’t have to be costly or overly complex to carry out.

Spotlight

"APT attacks have led to highly visible security breaches at Target and other well-known organizations. This whitepaper explores three approaches for combating the critical APT lifecycle stages - protect, detect and remediate. The whitepaper also highlights how multi-tenant cloud solutions are better equipped than appliances in providing protection against APT attacks."

resources