Endpoint Security Got You Down? No PowerShell? No Problem

Black Hills Information Security

Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs & Windows Defender every time you need to pop a box? In this one-hour webcast, we introduce a somewhat new Red Team approach that we call BYOI (Bring Your Own Interpreter).  Turns out, by harnessing the powah of C# and the .NET framework you can embed entire interpreters inside of a C# binary. This allows you to dynamically access all of the .NET API from a scripting language of your choosing without going through Powershell in any way!  We also cover some basic .NET & C# concepts in order to understand why this is possible and all the hype surrounding offensive C# tradecraft.
Watch Now

Spotlight

European data protection law permits an organisation to use a Managed Security Service Provider ('MSSP') such as Dell SecureWorks. Actually, not only does the law permit the use of a MSSP, but in many respects it also supports it, in the sense that good quality managed security services provide an enhanced level of security measures, expertise and awareness and enable organisations to make efficient use of their resources, thereby enabling them to achieve better data security and meet the requirements of the law. Download this white paper to understand the legal position IT is in and consider the characteristics of a good quality MSSP for data protection purposes.


OTHER ON-DEMAND WEBINARS

Preventing and Mitigating Ransomware Infections

KnowBe4

Not a week goes by without hearing about a network breach of some major corporation, agency or public figure, including government officials! If these powerful entities have been compromised, what chance do you have? Phishing and spear-phishing are real threats, but you can protect your users by making sure you're a hardened target. Join KnowBe4's Founder and CEO, Stu Sjouwerman and Baseline Technologies' Microsoft MVP Mike Crowley on this webcast. Stu and Mike will describe today's threat landscape and offer some practical, every-day protections you can take to protect your organization.

DDoS Attacks: The Stakes Have Changed, Have You?

Arbor Networks

Despite years of headlines, many businesses today are under-invested and ill-prepared to handle modern DDoS attacks. Many wrongly believe they are not being targeted by DDoS attacks, and are in fact experiencing outages due to DDoS attacks that are being attributed to equipment failures or operational error because the companies lack DDoS visibility and defense. Still more rely on existing, more traditional, security devices such as firewalls and intrusion prevention systems (IPS), or a single layer of protection from their ISP or content delivery network (CDN). In each case, these businesses are exposed and only partially protected. Firewalls and IPS are stateful devices that are often targets of DDoS attacks, while cloud-only or CDN protection does not provide adequate protection for critical business applications.

Pulse Policy Secure - Context-Based Admission Control

"Is your network an intelligent gatekeeper? Find out how you can transform your network during the webinar, “Pulse Policy Secure – Context-Based Admission Control” Pulse Policy Secure turns your existing network edge infrastructure into a dynamic and intelligent gatekeeper that is able to incorporate user identity and role, device platform and health, location, behavior, and more into everyday access decisions. In this webinar you will also learn: 1. How context-based access control enables a wide variety of enterprise security scenarios from BYOD to guest access compliance 2. How Pulse Policy Secure can enable the intelligent enterprise edge"

Mobile Security: 2016 Wrap-Up and 2017 Predictions

Skycure

2016 has been a fully packed year for mobile security, with the first major public exposure of sophisticated state-sponsored cyber espionage, and the evolution of mobile spyware technology for corporate espionage.

Spotlight

European data protection law permits an organisation to use a Managed Security Service Provider ('MSSP') such as Dell SecureWorks. Actually, not only does the law permit the use of a MSSP, but in many respects it also supports it, in the sense that good quality managed security services provide an enhanced level of security measures, expertise and awareness and enable organisations to make efficient use of their resources, thereby enabling them to achieve better data security and meet the requirements of the law. Download this white paper to understand the legal position IT is in and consider the characteristics of a good quality MSSP for data protection purposes.

resources