Responding to the Modern Day DDoS Attack

Corero

The sophistication, volume and frequency of DDoS attacks have evolved into major network availability and security threats. In the past, DDoS attacks were simply considered brute-force network attacks. These volumetric attacks continue to exist; however the DDoS threat has become far more sophisticated and difficult to detect and protect against. The toolkits that attackers are using to create massive IoT botnets or execute low-level targeted application layer DDoS attacks are more accessible than ever before. These attacks are the leading internet-based threats facing companies as well as the internet and hosting providers servicing them. Join this webchat to learn how to better prepare for the impending increase in sophistication and scale of DDoS attacks.
Watch Now

Spotlight

In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones - Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro-and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.


OTHER ON-DEMAND WEBINARS

Firewall as a Service Beyond the Next Generation Firewall

Fidelis Cybersecurity

Firewalls and UTMs have been the cornerstone of network security for the past 20 years. Yet, deploying appliances at every remote office, creates multiple challenges for organizations: the capital needed to buy, upgrade and retire hardware solutions and the people needed to configure, patch and manage them. IT teams are also seeing an increasing pressure to allow Direct Internet Access at branch locations, which is further driving the need to deploy distributed security solutions. Even when running smoothly, firewalls and UTMs still do not protect the mobile users and Cloud infrastructure that are now an integral part of the business
Watch Now

Cybersecurity - Know the Risks and Protect Your Company

Hunton & Williams LLP

Cybersecurity and data privacy are among the most pressing issues facing companies today. Companies must proactively take steps to protect themselves against the risks arising from the loss or compromise of personal data, intellectual property and other proprietary information. This webinar will cover the privacy and cybersecurity issues faced by most global organizations, and explain steps that can be taken to reduce corporate risk arising from these issues.
Watch Now

Phishing and Fraud: Latest Trends and Best Practices for Protection

Easy Solutions

Join us for this, interactive webinar, where you will learn:What the latest threat trends are that we are seeing in 2017 and going into 2018, Which organizations are most at risk,How you can implement immediate strategies to proactively protect your institution and your customers.
Watch Now

Cyber Security Strategies Protecting Your ICS Investments

Learn how to prevent cyber-attacks to preserve and protect your operations and strategic infrastructure investments. Participants will learn high-efficiency approaches to securely implement true end-to-end embedded security that will work with current operational systems and secure all devices connected to your network without sacrificing productivity and safety standards.During this webinar you will:Review standards for security laid out in IEC 62443/ISO 27001,Consider commonly overlooked critical vulnerabilities,Study methods for aligning the threat landscape to today’s hacker trends, techniques and technologies,Evaluate strengths and shortcomings of multilayer and multivendor security,Examine costs associated with PLC-focused attacks.
Watch Now

Spotlight

In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones - Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro-and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.

resources