HOW CAN YOU DEFEND YOURSELF IF YOU DON'T KNOW WHAT'S ON THE HORIZON?

SurfWatch Labs

SurfWatch serves as our threat intelligence team, providing us with critical link analyses and insights to proactively address any potential cyber threats to our customers and our business. Knowing what cyber threat and Dark Web activity is occurring helps us ensure the safeguarding of customer information and focus our cybersecurity efforts in the right areas.
Watch Now

Spotlight

Whatever your favorite metaphor may be - mountain, tsunami, landslide, or avalanche - it's an inarguable fact that we live in a world that is creating and storing more data than most of us can imagine. From presentations and emails, to videos and photos, to documents of every type, we create 2.5 exabytes of data every day - and that volume shows no signs of abating. The biggest contributor to that growth is unstructured data - the data that lives outside the rows and columns of classic database systems.

OTHER ON-DEMAND WEBINARS

Through the Hacker’s Eyes: Detecting Attacks on Fully Patched Windows Machines

IBM

To successfully stop hackers, you need to understand them; how their minds work, what their goals are, and which techniques they use to break through your defenses. In this special edition of QRadar’s Under the Radar technical demo series, NA Security Architect and QRadar expert Jose Bravo will demonstrate first hand the sophisticated ways in which hackers today compromise Windows systems, even when they are fully patched and have antivirus deployments. He will then walk through how QRadar is able to detect these SIE technology-evading attacks, keeping your most vital data safe from unwanted eyes.
Watch Now

The Gartner Top Cybersecurity Predictions for 2021-2022

Enterprises had to accelerate their digital initiatives in a short time, which forced organizations to control and manage disruptions to their business. As security and risk management leaders handle the recovery and renewal phases from the past two years, they must consider forward-looking strategic planning assumptions when allocating resources and selecting products and services. How do security and risk management leaders keep pace with the future of digital? In this complimentary webinar, discover the top predictions prepared by our cybersecurity experts for 2022. You’ll understand how to have a successful cybersecurity program built for the digital era, as global change could potentially be one crisis away.
Watch Now

Forrester-Led Webinar: Connecting the Relationship Between Threat Intelligence and Adversary

ThreatConnect

Join Forrester Analyst Rick Holland and ThreatConnect Chief Intelligence Officer Rich Barger for a webinar on understanding your adversary and the importance of proper threat intelligence analysis to proactively defend your organization
Watch Now

Turning the Tables on Cryptojacking

Malwarebytes

It seems that criminal hackers are always a few steps ahead of everyone else and the recent onset of cryptojacking is a great example. In this webinar, independent information security consultant, professional speaker, and writer of Hacking For Dummies, Kevin Beaver, outlines what cryptomining and cryptojacking are and how they impact your business. He discusses strategies and tactics that you can use to ensure that your network and computer cycles are not used for someone else’s gains. From security policies and standards to endpoint controls to user training, this latest malware craze can be beaten but you must first understand it. Watch the replay and leave better prepared to address this threat.
Watch Now

Spotlight

Whatever your favorite metaphor may be - mountain, tsunami, landslide, or avalanche - it's an inarguable fact that we live in a world that is creating and storing more data than most of us can imagine. From presentations and emails, to videos and photos, to documents of every type, we create 2.5 exabytes of data every day - and that volume shows no signs of abating. The biggest contributor to that growth is unstructured data - the data that lives outside the rows and columns of classic database systems.

resources