Through the Hacker’s Eyes: Detecting Attacks on Fully Patched Windows Machines

IBM

To successfully stop hackers, you need to understand them; how their minds work, what their goals are, and which techniques they use to break through your defenses. In this special edition of QRadar’s Under the Radar technical demo series, NA Security Architect and QRadar expert Jose Bravo will demonstrate first hand the sophisticated ways in which hackers today compromise Windows systems, even when they are fully patched and have antivirus deployments. He will then walk through how QRadar is able to detect these SIE technology-evading attacks, keeping your most vital data safe from unwanted eyes.
Watch Now

Spotlight

Most enterprises today have heterogeneous IT environments that may include Microsoft Active Directory (AD), along with Unix, Linux, and Mac OS X. But each of these systems has its own identity, authentication and access requirements. AD bridge solutions address this problem by enabling Unix, Linux and Mac OS X systems to participate as "full citizens" in AD.

OTHER ON-DEMAND WEBINARS

Privileged Password Management 101: Laying the Foundation for Success

BeyondTrust

InfoSec pros have their work cut out for them—with the need to secure an estimated 300 billion passwords by 2020. Privileged password management, in particular, is a pain point for almost every organization. Privileged credentials are often difficult to identify, challenging to tame and properly secure, and if done improperly, can be costly to manage. Without strong privileged password management processes and technology in place, your organization is ripe for all kinds of security breaches. In many industries, lack of the proper protections in place alone puts you at risk from legal and/or regulatory fallout.
Watch Now

Workforce continuity and the Future of Work

For the past 30 years Citrix has helped organizations like yours embrace the ‘future of work.’ We know that the ‘future’ itself is a moving target and external forces can hamper business and the workforce. To minimize the risk of unforeseen events and foster enduring competitive advantage you will learn: What is business continu
Watch Now

How NHS Bolton Empowers Its Security Team with AI

Watch this webinar to hear how NHS Bolton Foundation Trust, a UK regional healthcare provider has overcome stretched resources using an innovative approach of automation and AI.
Watch Now

Tracking attackers. Why attribution matters and how to do it

Black Hills Information Security

In this BHIS webcast we cover some new techniques and tactics on how to track attackers via various honey tokens. We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst. We also cover some of the legal ramifications involved in do this. I am covering this for a couple of reasons. First, there are a lot of companies who are selling cyber deception in the form of honeypots, which is cool – but not near enough for attribution. Also, it is time to start gearing up for Black Hat.
Watch Now

Spotlight

Most enterprises today have heterogeneous IT environments that may include Microsoft Active Directory (AD), along with Unix, Linux, and Mac OS X. But each of these systems has its own identity, authentication and access requirements. AD bridge solutions address this problem by enabling Unix, Linux and Mac OS X systems to participate as "full citizens" in AD.

resources