Black Hills Information Security
In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5. Introduction, password spray toolkit, account lockout, honey accounts, canary tokens, and two factor authorization. fixthefuture , two factor authorization, dumping global address lists, mailsniper 20:30 Lateral movement, OWA, VPN, SSH. Scanning and enumeration, Nmap, SSH Brute Force, “Find Open”, LLMNR, LLMNR Responder, and NrlmRelayX.
Watch Now
BitSight
Learn how threat data fits into security ratings. Cyber attacks and data breaches are a regular challenge for organizations and their cybersecurity practitioners today. The consequences for a company that falls victim to a hacking attack or other form of data breach can be significant, incurring both financial as well as reputational damage as a result. Measuring and determining the security posture of an organisation is essential to understand the liability and exposure to risk your business faces at any given moment, to reassure staff, shareholders, customers, insurers and suppliers.
Watch Now
Microsoft Teams is arguably the most powerful workplace productivity tool on the market. But with such a robust solution comes a myriad of potential vulnerabilities that could affect your day-today business. In fact, both Gartner and Forrester report that 80% of SaaS breaches stem from misconfiguration, inappropriate user behavi
Watch Now
SurfWatch Labs
SurfWatch serves as our threat intelligence team, providing us with critical link analyses and insights to proactively address any potential cyber threats to our customers and our business. Knowing what cyber threat and Dark Web activity is occurring helps us ensure the safeguarding of customer information and focus our cybersecurity efforts in the right areas.
Watch Now