Auvik Networks
A new year brings new threats, new exploits—and new MSP opportunities in cybersecurity. Understanding global technology trends and cyberthreats like ransomware can help you successfully deliver security as a service to your clients. Auvik AVP of product management Patrick Albert talks with Tayler Feigl, Channel Development Manager, APAC at Datto to discuss key findings in Datto’s annual State of the Channel Ransomware Report, the result of interviewing 100,000 small to mid-sized business (SMBs) around the globe. You’ll hear what your MSP peers are doing to prepare, protect, and recover against ransomware, and investigate how you can use these findings to sell cybersecurity as part of your managed services offering.
Watch Now
Black Hills Information Security
In this BHIS webcast we cover some new techniques and tactics on how to track attackers via various honey tokens. We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst. We also cover some of the legal ramifications involved in do this. I am covering this for a couple of reasons. First, there are a lot of companies who are selling cyber deception in the form of honeypots, which is cool – but not near enough for attribution. Also, it is time to start gearing up for Black Hat.
Watch Now
Black Hills Information Security
Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs & Windows Defender every time you need to pop a box? In this one-hour webcast, we introduce a somewhat new Red Team approach that we call BYOI (Bring Your Own Interpreter). Turns out, by harnessing the powah of C# and the .NET framework you can embed entire interpreters inside of a C# binary. This allows you to dynamically access all of the .NET API from a scripting language of your choosing without going through Powershell in any way! We also cover some basic .NET & C# concepts in order to understand why this is possible and all the hype surrounding offensive C# tradecraft.
Watch Now
Data breach
Container adoption is skyrocketing, and so are concerns around securing container-based applications. While the market is still in its early phase of embracing this technology, lessons learned from securing Fortune 500 enterprise deployments against simple and sophisticated attacks alike are showing the path forward. Join us on an investigative journey as we explore popular attack vectors that have been used to breach container-based environments, provide best practices and tools to mitigate them, and discuss associated business risks.
Watch Now