Here Phishy, Phishy, Phishy!

Zimperium

Definitionally, phishing is a social engineering attack that tricks users into clicking on a link that takes them to a site that either a) delivers a malicious payload to compromise a device, or b) further tricks them into divulging their credentials. While the former immediately weaponizes the device, the latter often provides the reused passwords that lead to compromise and penetration of the corporate network and resources.
Watch Now

Spotlight

Monitoring sits at the foundation of the service provider's business. If monitoring operations aren't optimized, service providers will continue to struggle to meet current demand - and find it increasingly difficult to adapt as new demands and opportunities arise. This white paper outlines how critical monitoring governance is to optimizing operations, and it details the key requirements to instituting effective monitoring governance in your organization.


OTHER ON-DEMAND WEBINARS

"Taking TLS Security to the next level"

globalsign

SSL/TLS security remains a central component of an organisation’s security strategy. Find out about the latest in best practice and compliance and learn how to keep your website secure, protect your customers from attacks, and safeguard your company reputation. In this webinar we give you 3 tips you can implement today to enable the highest levels of SSL/TLS security
Watch Now

The difference between Cybersecurity and Information Security

PECB

Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of information technology (IT).
Watch Now

Cyber Threat Hunting: Identify and Hunt Down Intruders

InfoSec Institute

Are you red team, blue team — or both? Get an inside look at the offensive and defensive sides of information security in our upcoming webinar series. Senior security researcher and InfoSec Instructor Jeremy Martin discusses what it takes to be modern-day threat hunter during this on-demand webinar, Cyber Threat Hunting: Identify and Hunt Down Intruders. The webinar covers: The job duties of a Cyber Threat Hunting professional.
Watch Now

Symantec Predictions for 2016 – Looking Ahead

Throughout 2015, we saw how much consumer and corporate confidence was rocked by the number of mega breaches that exposed the identities of millions of people. So what lies ahead next year? As the year draws to a close, Symantec’s security intelligence team has put together the top security predictions for the year ahead and beyond. Join our webinar to hear about our top predictions for 2016 and what they mean for you
Watch Now

Spotlight

Monitoring sits at the foundation of the service provider's business. If monitoring operations aren't optimized, service providers will continue to struggle to meet current demand - and find it increasingly difficult to adapt as new demands and opportunities arise. This white paper outlines how critical monitoring governance is to optimizing operations, and it details the key requirements to instituting effective monitoring governance in your organization.

resources