That Was Close! Tales of Near-Miss Mobile Attacks

Zimperium

100% of Zimperium customers have detected mobile threats, and many of those customers previously believed they weren’t at risk. If you think your mobile devices are not being attacked, we are sorry to tell you that you are wrong. But don’t take our word for it, join us for tales of near-miss mobile attacks from real customers. They are near-misses only because Zimperium detected the attacks, but they could have been disastrous otherwise.
Watch Now

Spotlight

With the recent hack of online affair website Ashley Madison, cyber-crime is in the spotlight. However, it’s been an issue plaguing both companies and users for many years and one that shows no signs of halting. Thanks to the increased fame of ‘hacktivists’ like the group Anonymous, who use hacking as a social justice tool, hacking is sometimes regarded as a method of extracting justice on corporations the public can’t touch.Unfortunately, the idea of hacking being pro-public couldn’t be further from the truth. Despite high profile hacks against governments and businesses, the customer and average home user is still the main victim of cyber-crime. This was highlighted in 2014 when eBay was hacked and users had to change their passwords to prevent their accounts from being compromised.

OTHER ON-DEMAND WEBINARS

Live Broadcast: Be Empowered to Threat Hunt in 2019

Carbon Black

New research from Carbon Black shows that cyberattacks are becoming more frequent and more sophisticated, as nation state actors and crime syndicates continue to leverage fileless attacks, lateral movement, island hopping and counter incident response in an effort to remain undetected. This issue is compounded by resources and budgeting. Not only is there a major talent deficit in cybersecurity, there is also a major spending delta. What’s more, according to Carbon Black’s research, businesses are largely unaware about the scale, scope, and sophistication of modern attacks.
Watch Now

How To Create a Successful Cyber-Security Policy

DP Solutions

As security breaches become the new normal, having a cyber-security policy in place for your organization becomes essential. Technology alone cannot prevent a cyber-attack; therefore, businesses need to create a culture of security among their staff. The best way to do this is with cyber-security policies: a series of rules that define what end users may or may not do with their technology. In this on-demand webinar, DP Solutions’ Senior IT Risk Advisor Ben Schmerler discusses how to develop a solid and reasonable policy for your organization. From this webinar, you will learn: What information should be covered in your policies. Special considerations such as mobile devices, social media, compliance or legal concerns. How to properly document your policies. How to determine if your employees are following the policies. Technology options to enforce the policies.
Watch Now

Fine-Tuning ICS Threat Models to Prioritize Mitigations of the Most Vulnerable Devices

Radiflow

Of course, this cannot be further from the truth: ensuring security and safety of industrial control systems has always been the most important job for OT experts. However, after decades of dealing with unique technologies and regulations and with a traditionally strong focus on human and process safety, securing IT assets was by far not their top priority. As industrial networks are becoming increasingly complex, geographically dispersed and interconnected, however, both impact and probability of numerous cybersecurity risks are growing, and the biggest challenge for CISOs nowadays is no longer how to persuade OT people to take notice, but how to evaluate a vast number of potential threats and to prioritize the actions needed to protect their networks.
Watch Now

Social media and email phishing: How to protect financial information from fraudsters

Channel Futures

Email phishing remains a top security threat. Even smart and savvy people are fooled everyday by these malicious emails. They’re even harder to spot now that bad actors use information from social media to personalize their attacks against your customers and your business. In this webinar, Brian Wickenhauser, Mastercard’s Vice President of Security Events Management, will share examples of phishing attempts, how to spot them, ways to combat them and tips for improved safety – all important information to add to your security training programs.
Watch Now

Spotlight

With the recent hack of online affair website Ashley Madison, cyber-crime is in the spotlight. However, it’s been an issue plaguing both companies and users for many years and one that shows no signs of halting. Thanks to the increased fame of ‘hacktivists’ like the group Anonymous, who use hacking as a social justice tool, hacking is sometimes regarded as a method of extracting justice on corporations the public can’t touch.Unfortunately, the idea of hacking being pro-public couldn’t be further from the truth. Despite high profile hacks against governments and businesses, the customer and average home user is still the main victim of cyber-crime. This was highlighted in 2014 when eBay was hacked and users had to change their passwords to prevent their accounts from being compromised.

resources