"The Importance of Achieving True Endpoint Visibility"

Learn why true endpoint visibility is so important and what blind spots you may have. We will also show you how Falcon Host provides you with true end-to-end visibility into endpoint activity on your network, allowing you to keep adversaries out of your environment. In this video, CrowdStrike Principal Security Architect Elia Zaitsev demonstrates how Falcon Host eliminates blind spots in your endpoint monitoring, providing you with the speed, scale, detail and context you need to secure your networks against even the most advanced attacks
Watch Now

Spotlight

For the modern attacker, social media is a dream come true. In part 2 of our infographic series on the new breed of social cyber attack, we look in depth at a social engineering attack on a major financial institution. Would your organization detect an attack like this? In The Anatomy of an Enterpri


OTHER ON-DEMAND WEBINARS

AVAR Unraveled: Anti-virus Asia Researchers International Conference

While many are familiar with the more mainstream security conferences, such as RSA, BlackHat and Virus Bulletin, AVAR is an international conference put on by the Association of Anti-Virus Asia Researchers, meeting for the 18th year, which focuses on the specific topic of malware research and analysis. This presentation will review the content delivered at this conference and highlight the challenges and successes researchers have faced over the past year when analyzing malware to secure our online future.

Securing Your Website to Protect Brand Reputation

Entrust Datacard

Customers are doing more and more business online. Nearly 80% of the U.S. population shops online and half bank online. However, websites are constantly under attack. 71% of consumers feel it is up to the online stores to ensure the protection of their information, making website security a top priority for many businesses. In the last year, new vulnerabilities have been uncovered that allows malicious attackers to undermine security that organizations put in place to protect themselves and their end users sensitive information.

Best Practices for Assessing Cyber Vulnerabilities

Tenable

Today, every organization faces vulnerability overload. In 2018 alone, Tenable Research estimated nearly 19,000 new vulnerabilities would be disclosed. There are just too many to discover, assess and effectively mitigate. Reducing vulnerability overload means focusing like a laser on vulnerabilities most likely to impact your business right now. To learn how you can address this challenge, join Bill Olson, Technical Director with Tenable, for an on-demand webinar exploring best practices you can adopt to overcome vulnerability overload and better protect your business from cyber risk.

State of Cyber-Security Arms Race: Preparing for what's coming in 2018

Sonicwall

The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security industry and cyber criminals. Attend this webinar to gain a better understand the current State of Cyber-Security Arms Race. We’ll share our findings, intelligence, analysis and research to help you improve your security preparations and posture going forward.