The Hackers Paving the DDoS Path of Destruction

Hold Security, LLC

Based on recent DDoS attacks against DYN and a number of other critical targets on the Internet, let’s examine what drives the hackers behind the scenes. We are dealing with a different breed of hackers, not striving for fame or fortune but looking for a malevolent path of destruction. Understanding hackers’ motivation, their tools, capabilities goes along with scaling our defenses against similar devastating attacks.
Watch Now

Spotlight

One in every 99 work emails is a phishing attack, according to a recent Avanan report. With employees accustomed to a busy inbox, it's easy to fall victim to a phishing attack disguising itself as a regular message.


OTHER ON-DEMAND WEBINARS

Pragmatic Network Security: Avoiding Real-World Vulnerabilities

Peter Wood and his team analysed the results from a series of network penetration tests over the past two years, in a variety of sectors including banking, insurance and retail. They identified the most common vulnerabilities, how they can be exploited and the consequences for each business. This presentation demonstrates in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques

2019 Vulnerability Management Predictions

Nopsec

Michelangelo Sidagni, CTO and Parag Baxi, VP of Product Management, discussed customer comments from 2018. They covered vulnerability management complaints, requests, wishes and hopes. They have set some goals for the vulnerability management market for 2019 and discussed those goals on this webinar! Michelangelo & Parag Covered: Vulnerability scanning goals. Determining asset value. Attack Predictions: when will a vulnerability become dangerous? Vulnerability categorization. Remediation Goals.

"Avoiding a Breach with Security Analytics and Automated Response"

"In this webinar, our guest speaker John Kindervag, Vice President, Principal Analyst at Forrester Research, and Seth Goldhammer, Director of Product Management at LogRhythm, will discuss how pervasive visibility and big data security analytics, when coupled with intelligent automated response, can substantially reduce an organization’s risk of experiencing a material breach or cyber incident."

Best Practices for Mitigating Network Security Risks

Cradlepoint

With the rapid growth of mobile devices, cloud-based applications, credit card purchases, and the Internet of Things in the distributed enterprise, maintaining network security is more difficult, and more important, than ever before. Data breaches come in all shapes and sizes, and with increasing prevalence. From passwords to phishing, educating a company’s staff early and often is one of the most effective ways to mitigate cyber security risks.