Attack Tactics 6! Return of the Blue Team

Black Hills Information Security

In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5. Introduction, password spray toolkit, account lockout, honey accounts, canary tokens, and two factor authorization. fixthefuture , two factor authorization, dumping global address lists, mailsniper 20:30 Lateral movement, OWA, VPN, SSH. Scanning and enumeration, Nmap, SSH Brute Force, “Find Open”, LLMNR, LLMNR Responder, and NrlmRelayX.
Watch Now

Spotlight

Asahi Glass (AGC) is a prominent global manufacturer of glass and it boasts overall sales of approximately 1.35 trillion yen (full year 2014). Their challenges are moving mission-critical systems into the cloud, the customer required enhanced security for systems running on AWS, in order to promote multi-OS utilization on AWS, the security solution needed to protect both Windows Server and Linux Server and a solution needed to centrally manage both on-premises and cloud servers. They chose Trend Micro to overcome these challenges. They have implemented Trend Micro deep security. The results of implementing Trend Micro were mission-critical systems on AWS received the same high level of security as that of on-premises servers, using Trend Micro deep security, the company established a fundamental security policy and configuration for the cloud, ensuring company-wide security control for cloud usage and integrated operation and management of security for on-premises and cloud servers.

OTHER ON-DEMAND WEBINARS

Web Application Security Essentials

We know it’s a challenge to stay on top of your web application security with new vulnerabilities being introduced all the time by untrained developers. So what can be done? The most efficient way to reduce the attack surface is to educate your entire team on recognizing potential web security issues to avoid introducing vulnerabilities in the first place.
Watch Now

Trends in Privacy and Data Security

Privacy and data security remains a central issue, capturing the attention of consumers, regulators, and boards of directors. In this complimentary webinar, Mel Gates, Senior Legal Editor of Privacy and Data Security at Thomson Reuters, will cover: Data privacy compliance issues, with a special focus on the GDPR, Brexit, and the
Watch Now

Cloud security best practices for multi-cloud: Beyond native tools

As multi-cloud adoption accelerates, security teams are navigating the delta between each cloud provider’s native capabilities and comprehensive protection from bad actors.
Watch Now

THE DIFFERENCE BETWEEN ENDPOINT PROTECTION AND TRADITIONAL ANTIVIRUS

SentinelOne

Traditional antivirus solutions require a list of virus definitions - or "signatures" to detect known viruses and malware. But with nearly 1 million new malware threats released - every day, it is no wonder traditional antivirus can no longer cope. Learn the difference between traditional AV and Endpoint Protection. Discover the difference between signature-based and behaviour-based detection, and the fundamental differences between Antivirus and Endpoint Protection.
Watch Now

Spotlight

Asahi Glass (AGC) is a prominent global manufacturer of glass and it boasts overall sales of approximately 1.35 trillion yen (full year 2014). Their challenges are moving mission-critical systems into the cloud, the customer required enhanced security for systems running on AWS, in order to promote multi-OS utilization on AWS, the security solution needed to protect both Windows Server and Linux Server and a solution needed to centrally manage both on-premises and cloud servers. They chose Trend Micro to overcome these challenges. They have implemented Trend Micro deep security. The results of implementing Trend Micro were mission-critical systems on AWS received the same high level of security as that of on-premises servers, using Trend Micro deep security, the company established a fundamental security policy and configuration for the cloud, ensuring company-wide security control for cloud usage and integrated operation and management of security for on-premises and cloud servers.

resources