Thinking Like a Cyber Attacker: Strategies for Defense

Increasingly, enterprises are discovering that the best way to test and defend their organization is to view their IT environment from the perspective of an attacker. But how do you predict an attacker's motives and simulate their methods, and how do you know that you aren’t overlooking key vulnerabilities? In this Dark Reading webinar, experts discuss methods for testing your security’s mettle by thinking like your adversary.
Watch Now

Spotlight

Organizations are losing IT and security control Once upon a time, IT and security teams focused mostly on managing their organization’s on-prem environment. But as business requirements changed, customer bases became global, and remote work took root, these technology teams were handed responsibility across more domains: cloud

OTHER ON-DEMAND WEBINARS

The evolving cyber security threat: Introduction to Cryptomining

SolutionsPT

Webinar: The evolving cyber security threat: Introduction to Cryptomining. In this webinar we explore the current threat landscape affecting industry technology and how we recommend and can assist you in guarding against it.
Watch Now

Supply Chain Cybersecurity: How to Mitigate Third-Party Risks?

With supply chain transparency and digital transformation being among the top organizational priorities, cyber-related issues have become one of the top risks to businesses. Most companies don't consider their supply chain vulnerability when thinking about cybersecurity. Yet, supply chain risks could include multiple functions across the flow of information, products and services – needing the attention of all entities involved. Supply chain security is every company's responsibility.
Watch Now

Fine-Tuning ICS Threat Models to Prioritize Mitigations of the Most Vulnerable Devices

Radiflow

Of course, this cannot be further from the truth: ensuring security and safety of industrial control systems has always been the most important job for OT experts. However, after decades of dealing with unique technologies and regulations and with a traditionally strong focus on human and process safety, securing IT assets was by far not their top priority. As industrial networks are becoming increasingly complex, geographically dispersed and interconnected, however, both impact and probability of numerous cybersecurity risks are growing, and the biggest challenge for CISOs nowadays is no longer how to persuade OT people to take notice, but how to evaluate a vast number of potential threats and to prioritize the actions needed to protect their networks.
Watch Now

How to Spot a Phishing Email – 5 Signs to Look Out For

MediaPRO

This attempt went on to ask why the sender wouldn’t pay an “invoice” attached to the email. Our IT staff later confirmed this attachment carried a ransomware payload. Like the confusing influx of different Oreo flavors in recent years (cotton candy Oreos, really?), the variety of phishing email attempts has blossomed. The “shock and awe” method described above is not a new tactic, though the use of vulgarity seems to be a relatively new variation. Fake shipping confirmations. Tax-related W-2 requests. Emails requesting password resets for social media accounts, online banking, you name it. These are just a few ways scammers use social engineering to bypass technological safeguards and compromise sensitive data.
Watch Now

Spotlight

Organizations are losing IT and security control Once upon a time, IT and security teams focused mostly on managing their organization’s on-prem environment. But as business requirements changed, customer bases became global, and remote work took root, these technology teams were handed responsibility across more domains: cloud

resources