Emerging Threats, Hackers and Attackers: Stories from the SOC

Alert Logic

Cyber attacks are ever-evolving and it can feel like you are struggling just to keep up. It’s time to get ahead of the game. Join us for the latest attack trends and threat insights from Alert Logic’s own SOC analysts. You’ll hear what’s happening on the front lines of cybersecurity defense, and which attack vectors are worth watching out for. We’ll also discuss the costs of running your own SOC and share some alternative approaches to get 24/7 dedicated coverage and better intelligence than you can access on your own.
Watch Now

Spotlight

Richard Timbol Security Manager at Amalgamated Life was concerned with information security and turned to Proofpoint for Outbound Data Loss Protection and encryption.

OTHER ON-DEMAND WEBINARS

Global Threat Report: The Year of the Next-Gen Cyberattack

Carbon Black

2016 may have been “The Year of the Fileless Attack” and 2017 may have been “The Year of Ransomware,” but 2018 was, in many respects, “The Year of the Next-Gen Cyberattack." These attacks are increasingly being fueled by geopolitical tension and reveal how clever attackers have become in evolving to remain undetected — using techniques such as lateral movement, island hopping and counter incident response to stay invisible. Join our discussion on the latest in threat intelligence including: The most prevalent ransomware and commodity malware families during the past year. Why we're seeing increases in nation-state cyberattacks.
Watch Now

Live Broadcast: Be Empowered to Threat Hunt in 2019

Carbon Black

New research from Carbon Black shows that cyberattacks are becoming more frequent and more sophisticated, as nation state actors and crime syndicates continue to leverage fileless attacks, lateral movement, island hopping and counter incident response in an effort to remain undetected. This issue is compounded by resources and budgeting. Not only is there a major talent deficit in cybersecurity, there is also a major spending delta. What’s more, according to Carbon Black’s research, businesses are largely unaware about the scale, scope, and sophistication of modern attacks.
Watch Now

Computational Thinking and Skills: A Foundation for STEM and Cybersecurity Education

NIST

Success in multiple industry sectors or any of the hundreds of new tech-heavy jobs emerging in the modern economy requires a core competency: computational thinking and skills. Computational thinking and skills extend beyond computer programming to include a larger set of knowledge and skills broadly captured by a wide swath of STEM disciplines, including cybersecurity. This webinar will explain why acquiring computational thinking and skills are important for STEM-related careers and how to incorporate and assess computational thinking and skills as part of cybersecurity education and training programs.
Watch Now

Intelligent API Cybersecurity, Is Your Agency Protected?

Carahsoft

As government agencies move towards digital transformation, Cyber threats are getting smarter, using social engineering, brute force methods, and even artificial intelligence (AI) to bypass common defenses to gain access to these critical systems and data. To help protect Federal Agencies against an ever-diversifying landscape of cybersecurity threats, Axway and Ping Identity have formed a global partnership to deliver a comprehensive Application program Interface (API) security solution that optimizes security at all levels, from network to application.
Watch Now