Cryptolocker: Probing IT's New Worst Enemy

Cryptolocker and other ransomware have raked in hundreds of millions of dollars for the perpetrators, and the channel remains on the front lines of fighting this threat. In this webinar, Intronis and IT security expert Mike Davis, CTO of CounterTack, Inc. share a unique view inside this dangerous malware and best practices to protect your clients.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Why Security Awareness Should Not Stop at Phishing

Mediapro

If you’re keeping even half an eye on the InfoSec news cycle, you know how big of a problem phishing is. The annual Verizon data breach found again this year that phishing was the leading way for malware to enter networks, with the average company reporting that 94% of detected malware came in via email. Thirty-two percent of confirmed breaches started with phishing, again the most common tactic. It makes sense, then, that so much security awareness content out there is focused on this threat. Some vendors make their business on it almost completely, with this trend extending to the phishing simulator emerging as a key selling point for those in the security awareness business.
Watch Now

Controls are the Key to Cybersecurity Management Success

Controls are the critical foundation of an effective enterprise cybersecurity program. With more threats, more systems to protect, more tools to deploy and more people to manage, there is constant pressure to move faster and keep up with the ever-changing risk landscape. As a result, there is a need for the organization to have the proper controls in place to manage cybersecurity threats and risks across applications, systems, facilities and third parties.
Watch Now

How Zero Trust can help protect financial services networks

Forescout

Is Zero Trust really achievable given the complexity in financial service organisations, especially considering limited staff, mergers and acquisitions and compliance pressures? Join SC and ForeScout to learn how to embrace Zero Trust to: Proactively combat today’s high frequency and sophistication of cyberattack. Gain unparalleled situational awareness of malicious activity. Prevent the transfer of sensitive data and money. Simplify adherence to compliance regulations.
Watch Now

Reduce API Security Risks with Automated and Continuous API Scanning

Digital businesses have widespread API usage that makes it easier for organizations to share data and integrate with customer applications. However, since APIs expose application logic and sensitive data such as Personally Identifiable Information (PII), APIs have increasingly become a target for attackers leading to many serious data breaches in recent past. Gartner estimates that by 2022, API abuse will become the most-frequent attack vector, resulting in data breaches for many organizations.
Watch Now