Ready Before the Smoke Clears: understanding the correlation between DDoS attack

A DDoS attack is sometimes a smokescreen to cover up much more damaging activity such as theft or fraud. While you’re working frantically to mitigate the DDoS attack and get critical applications back online, cybercriminals could be working under the radar to break into your systems and conduct more malevolent activities.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

California Consumer Privacy Act: Are You Prepared for 2020?

InfoSec Institute

The California Consumer Privacy Act (CCPA), which gives residents more control over the use of their data and regulators increased powers to punish organizations, goes into effect on January 1, 2020. With California recently becoming the fifth largest economy in the world, the CPPA is expected to have wide-reaching impact.
Watch Now

How to Implement a Cybersecurity-first Culture for the Modern Workplace

The shift to the remote and hybrid workplace has presented new opportunities to hackers as they look to exploit weaknesses brought about by unfamiliar work practices, multiple and BYOD devices, and most importantly the busy day-to-day lives of our employees. According to email statistics, the average person receives over 100 emails per day (Earthweb), and with human error the cause of 85% of cyber security breaches (IBM) you can see why email is the number one threat vector.
Watch Now

Thinking Like a Cyber Attacker: Strategies for Defense

Veracode

Increasingly, enterprises are discovering that the best way to test and defend their organization is to view their IT environment from the perspective of an attacker. But how do you predict an attacker's motives and simulate their methods, and how do you know that you aren’t overlooking key vulnerabilities? In this Dark Reading webinar, experts discuss methods for testing your security’s mettle by thinking like your adversary.
Watch Now

Anatomy of Container Attack Vectors and Mitigations

Data breach

Container adoption is skyrocketing, and so are concerns around securing container-based applications. While the market is still in its early phase of embracing this technology, lessons learned from securing Fortune 500 enterprise deployments against simple and sophisticated attacks alike are showing the path forward. Join us on an investigative journey as we explore popular attack vectors that have been used to breach container-based environments, provide best practices and tools to mitigate them, and discuss associated business risks.
Watch Now