Bug Bounties and How They Help

Trend Micro

Once a vulnerability becomes known to cybercriminals, the race is on for vendors to create a patch before it is exploited. And with the regular use of exploits in attacks and threats like the WannaCry ransomware using a vulnerability, getting the win has never been so crucial. This month we will cover the bug bounty marketplace, including the different types of markets available to vulnerability researchers.  As well, we will review Trend Micro Research and how their research can benefit organizations through responsible disclosure and pre-disclosed filters to virtually patch vulnerabilities.
Watch Now

Spotlight

Cryptocurrencies. A decade ago, names such as Bitcoin, Dash, Etherem, and Monero were merely buzzwords. Fast forward to today, and they’ve become as recognizable as the U.S. dollar and the Euro. In many realms, these digital currencies are ushering in a new era of investing – a modern gold rush, albeit in digital form. As was the case during the physical gold rush in the mid-1800s, there are criminals looking to exploit innocent parties of their earnings. Carbon Black has found that modern-day cybercriminals are increasingly using the dark web to facilitate cryptocurrency theft on a large scale.

OTHER ON-DEMAND WEBINARS

Incident Response Masterclass: Investigate a Rogue Insider with Varonis

Varonis

Join our IR team for a play-by-play of a live attack simulation and investigation of a rogue insider threat using DatAlert’s new DFIR capabilities. During this training session, our security analysts will execute a new attack scenario in our lab. An insider was paid to exfiltrate sensitive organizational data. To remain uncovered, he takes control on a service account. Using the service account, he scans company filers for documents with indicating keywords. Copies matching documents to his PC.
Watch Now

Top Ten Ways to Handle Contracts Effectively In-House

Handling a large number of contracts is a fact of life for most in-house attorneys – with an ever-increasing volume and tight deadlines, even before a M&A or other event triggers a voluminous contract review. But it doesn’t have to be chaotic or disorganized: with the right processes and tools you can provide strong, responsive
Watch Now

OT & IoT Security Case Studies to Ensure Reliable Cyber Resilience

Uptime, disruption-free operations, and availability are important considerations for any OT and IoT security plan. Knowing the threats and ways to mitigate them is only half the battle. The other half involves aligning technology, assets, and knowledge base to secure the entire length and breadth of your business and its digital footprint.
Watch Now

Key Functionalities of a Modern Cyber Threat Intelligence Program

Everyone knows security is overloaded work wise – not everyone understands what that means. Cyber Threat Intelligence (CTI) is typically very technical so how can you convince the teams setting business objectives and allocating resources (for budget) of what the cybersecurity priorities should be? A modern CTI program needs to show value to the business because it will help solve some of the major problems we’re seeing in TI programs today (such as lack of resources or lack of data). Part of this includes bridging the gap between threat and risk to ensure your operational strategy aligns with the overall business objectives.
Watch Now

Spotlight

Cryptocurrencies. A decade ago, names such as Bitcoin, Dash, Etherem, and Monero were merely buzzwords. Fast forward to today, and they’ve become as recognizable as the U.S. dollar and the Euro. In many realms, these digital currencies are ushering in a new era of investing – a modern gold rush, albeit in digital form. As was the case during the physical gold rush in the mid-1800s, there are criminals looking to exploit innocent parties of their earnings. Carbon Black has found that modern-day cybercriminals are increasingly using the dark web to facilitate cryptocurrency theft on a large scale.

resources