Cryptocurrency Fraud and Blockchain Forensic Analysis

When a total of $580 Million left two Cryptocurrency exchanges after a sophisticated compromise, LIFARS team was engaged in an investigation that involved FBI, US Secret Service, Europol, DHS, IRS and DOJ. This session will take you exclusively inside that investigation and discuss: Cryptocurrency fraud schemes, including real stories from the trenches; AML issues with bankers, hidden assets, payments by drug lords and ransomware; Blockchains role in tracking the transactions - and its limits.
Watch Now

Spotlight

Industry 4.0 is transforming the manufacturing and industrial landscape by integrating advanced technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), and cloud computing. While these innovations provide immense benefits, they also ramp up the risk of cyberattacks due to increased connectivity and a lar

OTHER ON-DEMAND WEBINARS

Deploying Secure Modern Apps in Evolving Infrastructures

Security Boulevard

Software development is changing. It is now measured in days instead of months. Microservice architectures are preferred over monolithic centralized app architecture, and cloud is the preferred environment over hardware that must be owned and maintained. In this webinar, we examine how these new software development practices have changed web application security and review a new approach to protecting assets at the web application layer.
Watch Now

How to Leverage Hacking Competitions as an Educational and Recruitment Tool

HealthcareInfoSecurity

One of the most-heard complaints from security experts is that often they find their work repetitive ("The CFO's laptop has been compromised... again!"), which results in the desire of trying something "new", meaning "leave for another company." Another common complaint is that the work is very compartmentalized, and there are few occasions in which the various security specialists can enjoy working as a team. One activity that can help build a team while improving the security skills of the people involved is participating in Capture the Flag (CTF) hacking competitions. In 2003 at the University of California at Santa Barbara, one of the world's largest attack-defense CTF competitions began and has grown year-after-year, pushing the limits of the players and providing opportunities for better learning. In addition, hacking competitions are a great opportunity for recruiting new talent: CTF participants are highly skilled, well-motivated, and hard-working, which are great traits for a future employee.
Watch Now

Modernizing Cybersecurity with the Cloud

Every company is concerned about data breaches, and for good reason—according to industry estimates, approximately half of the companies in the U.S. have suffered a data breach. As organizations seek to better secure their environments, they are facing a number of challenges including growing data volumes and expanded attack surfaces, as well as data silos and the inability to enable data-driven decisions about security issues in real time. It is not surprising that security and privacy rank in the top three data-related priorities in TDWI surveys.
Watch Now

Cybersecurity and Robotics Systems: Vulnerabilities and Solutions

Our Research Analyst, Satyajit Sinha will be speaking at the RoboBusiness Webinar on July 9th 2020 at 2 PM EST. The topic of the webinar is “Cybersecurity and Robotics Systems: Vulnerabilities and Solutions”. One class of edge products, rarely mentioned in the typical IoT discussions and analyses, also provide for actuation. That is, they are robotic devices. Like other ‘connected’ IoT devices, robotics systems are open to security threats, which can be one roadblock to their widespread deployments. In this session, Counterpoint Research’s Satyajit Sinha will discuss current and future cyber security threats to networked robotics systems, highlighting their vulnerabilities in the process. He will also describe various cyber security solutions and provide a competitive landscape of security solutions for robotics systems.
Watch Now

Spotlight

Industry 4.0 is transforming the manufacturing and industrial landscape by integrating advanced technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), and cloud computing. While these innovations provide immense benefits, they also ramp up the risk of cyberattacks due to increased connectivity and a lar

resources