Turning the Tables on Cryptojacking

It seems that criminal hackers are always a few steps ahead of everyone else and the recent onset of cryptojacking is a great example. In this webinar, independent information security consultant, professional speaker, and writer of Hacking For Dummies, Kevin Beaver, outlines what cryptomining and cryptojacking are and how they impact your business. He discusses strategies and tactics that you can use to ensure that your network and computer cycles are not used for someone else’s gains. From security policies and standards to endpoint controls to user training, this latest malware craze can be beaten but you must first understand it. Watch the replay and leave better prepared to address this threat.
Watch Now


Learn from the industry experts how to prevent DDoS attacks from taking down your website in our new infographic. DDoS HURTS ARM YOURSELF WITH KNOWLEDGE WHAT IS A DDoS Attack? DDoS attacks (distributed-denial-of-service attack) is comprised of many systems (often thousands of infected computers) wor


Time for a New Security Model

"Justin Somaini, Chief Trust Officer for Box runs through tried and true best practices for building out a security strategy that keeps your sensitive data safe in a cloud environment. Justin will discuss the challenges organizations face with distributive computing along with the benefits of centralization and how your organization can implement security practices that keep information secure without compromising efficiency or productivity. He will also run through how Box secures it's content and what you can do today to make sure your organization is staying safe and compliant in the cloud. "

See something say something: A humanistic approach to security intelligence

"Attackers are constantly trying to find new exploits to penetrate network defenses and bypass security controls. In 2014, Mandiant’s M-Trends report indicated that it takes an average of 229 days to detect the presence of a threat actor on an enterprise network. Organizations are starting to realize that the evolution in technologies alone cannot stop such incidents, as the actors continue to change their tactics. Organizations need to consider supplementing their security technologies and processes with their people. By leveraging employees as human sensors, we not only adopt “see something, say something”, but we are able to add an extra layer of defense and exponentially reduce detection time as well. In this webinar, PhishMe’s Senior Researchers Ronnie Tokazowski and Shyaam Sundhar will discuss: • Engaging human sensors as a layer of defense • Utilizing user reports to detect malware • Real use cases of user detection within our enterprise"

The Set-and-Forget Web Application Firewall. with AI


Learn more about a breakthrough "set-and-forget" web application firewall that combats increasing hacker sophistication and addresses the exhaustive and excessive false positive debacle encountered with traditional WAFs.

How to Keep a Cloud Environment Current, Secure and Available

"This webinar will dive into the industry standard for architecture of cloud computing. It will provide an overview of the most important people, processes and technology to keep the cloud environment up and running, secure and available. Best practices and experience will be shared."