Q3 Malware Review: Evolution of Locky and Quiet Malware

During the third quarter of 2016, the PhishMe Intelligence team generated 689 active threat reports that highlighted indicators of compromise, tactics, and techniques that serve as the hallmarks of phishing attacks. Two key stories stood out this quarter. Locky continued to steal headlines as the dominant ransomware by continuing to innovate and avoid detection by experts. Meanwhile, other, quieter malware remained an ever-present threat to companies of all sizes. Join Brendan Griffin, Threat Intelligence Manager, PhishMe to learn about.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Critical Actions to Survive a Data Breach in 2019 & Beyond

BitSight

Learn how to prepare for and survive a data breach. With large-scale data breaches continuing to make the headlines in 2018, today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyber attacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.
Watch Now

Focus on Open Source Compliance and Security During Legal TransactionsEnable Ginger

Data points to the fact that companies have difficulty managing third-party open source within their software code bases, leading to compliance, IP, and security risk. These risks are often amplified in legal transactions and can impact “go”/”no go” decisions if not addressed throughout the legal process. Join Leon Schwartz, Ass
Watch Now

Simulated Phishing and Awareness Training

ActualTech Media

Old-school awareness training does not hack it anymore. Your email filters have an average 10-15% failure rate; you need a strong human firewall as your last line of defense. Join us for a live demonstration of how KnowBe4 introduces a new-school approach to Security Awareness Training and Simulated Phishing. See the latest product features and how easy it is to train and phish your users. Find out how 25,000+ organizations have mobilized their end-users as their human firewall.
Watch Now

NIST Recommendations for ICS & IIoT Security

SANS

WannaCry, NotPetya, and TRITON demonstrate that ICS and IIoT networks continue to be soft targets for cyberattacks, increasing the risk of costly downtime, safety failures, environmental incidents, and theft of sensitive intellectual property. NIST and the NCCoE recently published a NIST Interagency Report (NISTIR) demonstrating how off-the-shelf, ICS-aware behavioral anomaly detection (BAD) effectively reduces cyber risk for manufacturing organizations, without impacting OT networks, as well as risk from equipment malfunctions.
Watch Now