Main Cyber Attack Destinations in 2016

CareersInfoSecurity

The big story for Q1 2016 in the digital identity network is that although authentication continues to be a key imperative for global digital businesses, attacks are evolving and becoming more pernicious and hugely widespread, including more mobile attacks than ever before. In Q1 alone, 411 million attacks were detected in the ThreatMetrix Digital Identity Network, of which 311 million were bot attacks.
Watch Now

Spotlight

"Mobile devices are as personal as a non-vital organ: it's possible to live without them, but why try? Your employees want to use their own devices at work - iPads, iPhones, Androids, whatever - which is often met with resistance from IT. But there's no need for conflict.
Download this whitepaper to learn new ways to offer employees the freedom to choose their own mobile devices, while still providing the rock-solid security needed to appease IT. "


OTHER ON-DEMAND WEBINARS

Can a Certificate Improve Security?

"Security is a term commonly used in today's market place, but not all security is made equal. For many organizations, and for many vendors, security can mean many different things. Over the past few years a number of well-known brands and institutions have been breached despite having had a high level of assurance that their corporate security was more than good enough. So what's the answer? How can organizations prevent security breaches? Well while it may not be possible to completely prevent a breach, organizations can certainly make it difficult enough so that an attacker will go elsewhere. To that point, Public Key Infrastructure or PKI is an incredibly secure means of enhancing organizational security. Once considered by analysts as an obsolete technology, PKI is making a huge comeback, as we witness the huge rise in mobile workforces and the surge in IoT, PKI is a trusted solution proven over 20 years that can assure trust by assessing the authenticity of the multitude of devices that make up our interconnected world"

Cybersecurity Games: Building Tomorrow’s Workforce

NICE

Join us during Computer Science Education Week as we discuss the growing momentum in computer science education and how cybersecurity can help support this growing effort. The U.S. House of Representatives has designated December 5-11, 2016 as Computer Science Education Week (CSEdWeek) in recognition of the transformative role of computing and necessity of rigorous computer science education at all levels.

WannaCry Ransomware Attack: Splunk Briefing and Demo

Splunk

From national health agencies to public transportation infrastructure, the recent WannaCry ransomware attack has upended organizations around the world. Although a security issue, the fast propagation and business-impacting nature of the attack shows that ransomware is a greater concern that affects all of IT. How can you better prepare and respond to such threats? Watch this OnDemand webinar to learn how to apply a broader analytical approach and data-driven techniques to quickly pinpoint the source of an attack and determine the appropriate remediation steps.

How to De£use the Fraud and Mone¥ Laundering Tim€ Bomb Ticking in Tran$lation

"History teaches us that when things go seriously wrong in the legal and financial world the effects can take Nations to the edge of the abyss and spell personal and economic disaster for citizens and organisations not protected. The scandals of sub-prime mortgages, Libor and Payment Protection Insurance (PPI) provide a sobering reminder of what happens when professionals don’t follow the rules. This presentation exposes a risk that is often unseen – translation. In his presentation, David will: • Discuss the factors that contributed to recent financial scandals; • Ask why scandals such as PPI went undetected for so long despite being identified a decade earlier. • Highlight the nature of threat society faces from financial crime; and the new tougher enforcement approach being adopted by regulators."

Spotlight

"Mobile devices are as personal as a non-vital organ: it's possible to live without them, but why try? Your employees want to use their own devices at work - iPads, iPhones, Androids, whatever - which is often met with resistance from IT. But there's no need for conflict.
Download this whitepaper to learn new ways to offer employees the freedom to choose their own mobile devices, while still providing the rock-solid security needed to appease IT. "

resources