IBM
Dark web forums and marketplaces can be treasure troves of data on threat actor activities, motivations, and capabilities. Often organizations desiring to obtain this valuable information attempt to conduct their own dark web research. However, what they usually learn too late is that setting up effective, efficient dark web access can be costly, difficult, and dangerous to the organization. This webinar covers the challenges setting up a dark web collection apparatus, and why for most organizations using an independent provider makes more sense.
Watch Now
We know it’s a challenge to stay on top of your web application security with new vulnerabilities being introduced all the time by untrained developers. So what can be done? The most efficient way to reduce the attack surface is to educate your entire team on recognizing potential web security issues to avoid introducing vulnerabilities in the first place.
Watch Now
Zimperium
100% of Zimperium customers have detected mobile threats, and many of those customers previously believed they weren’t at risk. If you think your mobile devices are not being attacked, we are sorry to tell you that you are wrong. But don’t take our word for it, join us for tales of near-miss mobile attacks from real customers. They are near-misses only because Zimperium detected the attacks, but they could have been disastrous otherwise.
Watch Now
BSI
Join BSI for a webinar where we’ll explore findings from the 2019 State of the Phish Report by our partner, Proofpoint. It provides the data-driven intelligence you and your team need to manage end-user risk more effectively within your organization. In this webinar, we will explore data related to the following: Tens of millions of simulated phishing emails: Analysis of tens of millions of simulated phishing emails sent to end users over a 12-month period. 16 industries: Comparisons of activities and results from organizations and their employees across 16 industries. Nearly 15,000 survey responses from infosec professionals: Responses reveal the challenges they are facing, their views of the threat landscape, and the actions they’re taking to fend off phishing attacks.
Watch Now