How DNS-Based Attacks Operate from the Inside Out, and How to Defend Against Them

Infoblox

The Domain Name System (DNS) plays a critical role in modern network connectivity. Unfortunately, it is also a central part of many cyber-attacks as DNS is involved in more than 90% of malware/ransomware and nearly half of all data exfiltration incidents. So how exactly how do cyber-criminals use DNS to carry out attacks? In this webinar we will examine the many ways cybercriminals exploit the unique properties of DNS.
Watch Now

Spotlight

Distributed Denial of Service (DDoS) attack constitutes one of the prominent cyber threats and among the hardest security problems in modern cyber world. This paper is to review the DDoS detection techniques and developing a numeric stable theoretical framework used for detecting various DDoS attacks in cloud. This paper is devoted to review and analysis of algorithms used for detection of DDoS attacks. The framework theorized here deals with the variability calculation method in conjunction with sampling, searching methods to find a current state of a particular parameter under observation for detecting DDoS attacks.

OTHER ON-DEMAND WEBINARS

Improving AppSec With Application Security Posture Management

By now, everyone has heard of the *AST scanning technologies. Most have been around for 15+ years, yet organizations are still struggling to eliminate AppSec issues like SQL injection and XSS vulnerabilities because these scanning tools look at vulnerabilities through a vulnerability lens, not a contextual risk lens.
Watch Now

Global Survey of Cybersecurity Leaders: Benchmarking Security Gaps & Privileged Access

Learn from your industry peers’ journeys to protecting privileged identities, stages of privilege access security, what they have achieved so far, and how to get the most value out of your cybersecurity investment. More than 2000 IT security leaders around the world shared their insights to create this research study. The broad reach of this study provides an opportunity to compare the PAM-related activities and attitudes of IT security practitioners with varying levels of responsibility, in different countries, industries, and companies of all sizes.
Watch Now

Benchmarks for Corporate Cybersecurity

SIA

This webinar from Women in CyberSecurity (WiCyS) and the Security Industry Association (SIA) will present the findings of The Cybersecurity Imperative research project produced by WSJ Pro Cybersecurity and ESI ThoughtLab and sponsored by SIA. We will share insights into how 1,000-plus organizations around the globe measure their cybersecurity preparedness and how they are preparing for future cyber threats.
Watch Now

Learning at the Speed of Business

Join Ian Stevens, North America L&D Lead at Publicis Sapient will share his team's successful learning programs that prepared Sapient's consultants to be leaders in digital transformation. Watch now to walk away with: A proven "push-pull" blended learning program How to tie learning with hiring & staffing priorities to motivate
Watch Now

Spotlight

Distributed Denial of Service (DDoS) attack constitutes one of the prominent cyber threats and among the hardest security problems in modern cyber world. This paper is to review the DDoS detection techniques and developing a numeric stable theoretical framework used for detecting various DDoS attacks in cloud. This paper is devoted to review and analysis of algorithms used for detection of DDoS attacks. The framework theorized here deals with the variability calculation method in conjunction with sampling, searching methods to find a current state of a particular parameter under observation for detecting DDoS attacks.

resources