"A single vulnerability is all an attacker needs"~ A cybersecurity saying that fits with the facts even till date. Security incidents frequently make the headlines, and it is always a surprise when the walls of highly protected infrastructures are breached. More often than not, when security attacks happen on organizations, investigative reports only reveal the less intrusive details, and avoid disclosing confidential information that may impact IT security.
Watch Now
RedVector
During this webcast, RedVector Senior Director of Product Management Bobby Person outlines the reasons why organizations must protect data and streamline projects, and provides training strategies to get started. Discover how your project managers, IT developers, software engineers and others can manage projects and resources to exceed expectations, mitigate network attacks and vulnerabilities, and earn important industry credentials and certifications using new project management training and IT infrastructure/security training.
Watch Now
Link11
2018 is the year of high volume DDoS attacks. Since the emergence of the new attack vector memcached reflection in February, new bandwidth records have been set. Companies worldwide suddenly found themselves exposed to a new DDoS risk. In a webinar, the Link11 IT security experts Karsten Desler and Aatish Pattni explain how to assess the threats. Today's global IT infrastructures face a DDoS threat that has never existed before with such massive bandwidths. This issue relates to attack vectors, which can hit companies with a really destructive attack volume due to enormous amplification factors. The largest possible 'amplification reflection vector' to date has been detected in memcached reflection attacks. Cyber criminals can theoretically use the vector to increase their attacks by a factor of 50,000.
Watch Now
Security leaders need comprehensive strategies that take both physical security and cybersecurity into account. This session covers: How to develop a holistic security strategy How to implement a framework to align both security functions How to bridge the gap between cyber and physical security operations How to leverage data-d
Watch Now