After the Data Breach: Stolen Credentials

Security Boulevard

When usernames and passwords are compromised in a data breach, the consequences extend far beyond the victim organization due to rampant password reuse. For this reason, NIST recently recommended that organizations check users’ credentials against a set of known compromised passwords. However, by patroning dark web forums and paying for spilled credentials, enterprises indirectly support the criminal ecosystem. Furthermore, attackers often don’t publicly post stolen data until months or years after the breach, if at all. Is there a better way to follow NIST guidelines and protect users from account takeover? Join Justin Richer, co-author of NIST Digital Identity Guidelines 800-63B, and Gautam Agarwal, Shape's Senior Director of Product Management, for a lively discussion on NIST’s password recommendations and how best to prevent account takeover fraud at your organization.
Watch Now

Spotlight

Your end-users are the weak link in your network security. Today, your employees are frequently exposed to advanced phishing attacks. Trend Micro reported that 91% of successful data breaches started with a spear-phishing attack.

OTHER ON-DEMAND WEBINARS

Knock, Knock! Who’s There. Finding Out Who’s Really on the Other End of that Password

As businesses settle into a hybrid world of on-prem, public cloud, private cloud infrastructure with security delivered as a service and all of this overlaid with the concept to Zero Trust, what is left? Companies will have the data they are trying to protect and the identity of the user trying to access something. As life on th
Watch Now

2022 Cyber Challenges & Industry Intelligence Study

The modern security organization is fueled by intelligence, advanced technology, and more knowledgeable professionals than any other point in history. However, the endless war that started at the dawn of connectivity often sees the same challenges as we do today and much of this stems from the misconception that organizations must fight threat actors on their own. This myth continues to create siloes, both internally and externally, and prevents teams from gaining necessary threat visibility or reducing overloaded analysts workload.
Watch Now

Computational Thinking and Skills: A Foundation for STEM and Cybersecurity Education

NIST

Success in multiple industry sectors or any of the hundreds of new tech-heavy jobs emerging in the modern economy requires a core competency: computational thinking and skills. Computational thinking and skills extend beyond computer programming to include a larger set of knowledge and skills broadly captured by a wide swath of STEM disciplines, including cybersecurity. This webinar will explain why acquiring computational thinking and skills are important for STEM-related careers and how to incorporate and assess computational thinking and skills as part of cybersecurity education and training programs.
Watch Now

TLS/SSL Inspection for Stronger Cybersecurity

With cyberattacks becoming easier and cheaper to launch, it’s no surprise that 80.5% of technology leaders consider cyber attacks at their organization likely. Pulse and A10 Networks surveyed 200 technology leaders to find out how their companies are thinking about SSL inspection and decryption solutions as part of a Zero Trust strategy.
Watch Now

Spotlight

Your end-users are the weak link in your network security. Today, your employees are frequently exposed to advanced phishing attacks. Trend Micro reported that 91% of successful data breaches started with a spear-phishing attack.

resources