Tracking attackers. Why attribution matters and how to do it

Black Hills Information Security

In this BHIS webcast we cover some new techniques and tactics on how to track attackers via various honey tokens.  We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst. We also cover some of the legal ramifications involved in do this. I am covering this for a couple of reasons. First, there are a lot of companies who are selling cyber deception in the form of honeypots, which is cool – but not near enough for attribution. Also, it is time to start gearing up for Black Hat.
Watch Now

Spotlight

In 2020, Cisco set out to move from a traditional networkbased perimeter and VPN model to a zero trust framework. Dubbed ‘borderless ’ internally, the core goal was to give users a secure, uniform experience accessing applications, wherever the user or application is located. Using the features of Duo Beyond, our team set out to

OTHER ON-DEMAND WEBINARS

CIO on Data Privacy and Securing Sensitive Information Shared in the Cloud

Bank information security

As organizations are relying more and more on cloud collaboration tools to store and share sensitive customer data, security concerns abound. Failure to comply with regulation is not a risk worth taking, and the financial cost, time lost and reputation damage from even one data breach can jeopardize an entire company. After all, it is the people behind the files and sensitive data that you need to protect.
Watch Now

Impact of Your Business Continuity Program on Cyber Resiliency

Business Continuity Awareness Week 2018 - Impact of your business continuity program on Cyber Resiliency. Every division inside IBM has a fully functional Business Continuity program focused on identifying what's critical to IBM's internal operations and making sure these business processes remain operational at time of disaster
Watch Now

Improving AppSec With Application Security Posture Management

By now, everyone has heard of the *AST scanning technologies. Most have been around for 15+ years, yet organizations are still struggling to eliminate AppSec issues like SQL injection and XSS vulnerabilities because these scanning tools look at vulnerabilities through a vulnerability lens, not a contextual risk lens.
Watch Now

Cyberattack Prevention for the Water & Wastewater Industry

America’s Water Infrastructure Act (AWIA) mandates (drinking) water systems serving more than 3,300 people to improve cybersecurity measures no later than six months after certifying the completion of a risk and resilience assessment. It is important to understand the various dimensions of the challenges in cyber securing water and wastewater treatment plants before we establish a roadmap to manage cyber threats, risks, and breaches.
Watch Now

Spotlight

In 2020, Cisco set out to move from a traditional networkbased perimeter and VPN model to a zero trust framework. Dubbed ‘borderless ’ internally, the core goal was to give users a secure, uniform experience accessing applications, wherever the user or application is located. Using the features of Duo Beyond, our team set out to

resources