Uptime, disruption-free operations, and availability are important considerations for any OT and IoT security plan. Knowing the threats and ways to mitigate them is only half the battle. The other half involves aligning technology, assets, and knowledge base to secure the entire length and breadth of your business and its digital footprint.
Watch Now
Link11
2018 is the year of high volume DDoS attacks. Since the emergence of the new attack vector memcached reflection in February, new bandwidth records have been set. Companies worldwide suddenly found themselves exposed to a new DDoS risk. In a webinar, the Link11 IT security experts Karsten Desler and Aatish Pattni explain how to assess the threats. Today's global IT infrastructures face a DDoS threat that has never existed before with such massive bandwidths. This issue relates to attack vectors, which can hit companies with a really destructive attack volume due to enormous amplification factors. The largest possible 'amplification reflection vector' to date has been detected in memcached reflection attacks. Cyber criminals can theoretically use the vector to increase their attacks by a factor of 50,000.
Watch Now
Lateral movement allows attackers to damage and steal information from an entire network once they gain access to one (usually the most vulnerable) entry point. Microsegmentation solves this problem by dividing a network into very small regions called microsegments, usually up to a segment per machine. However, if implemented incorrectly, it can be time-consuming, expensive, difficult to manage, and ineffective. Join Nicholas DiCola, VP of Customers at Zero Networks, and Aaron J. Goodwin, CISO at B. Riley Financial, as they share everything you need to know to effectively utilize microsegmentation for maximum network security and minimize the risk of attacks – including best practices, use cases, and the most easily deployable solutions to keep your organization safe.
Watch Now
Malwarebytes
It seems that criminal hackers are always a few steps ahead of everyone else and the recent onset of cryptojacking is a great example. In this webinar, independent information security consultant, professional speaker, and writer of Hacking For Dummies, Kevin Beaver, outlines what cryptomining and cryptojacking are and how they impact your business. He discusses strategies and tactics that you can use to ensure that your network and computer cycles are not used for someone else’s gains. From security policies and standards to endpoint controls to user training, this latest malware craze can be beaten but you must first understand it. Watch the replay and leave better prepared to address this threat.
Watch Now