Wealth Wizards: Threat Detection with Amazon GuardDuty and Alert Logic

Alert Logic

As part of its broader Managed Threat Detection and Response offering, Alert Logic provides an AWS-native security service that shows why, where, and how to respond to Amazon GuardDuty findings, while continuously assessing AWS configurations to find exposures and recommend actions that prevent future compromises. In this webinar, you'll learn how Wealth Wizards, a financial services company, utilizes AWS services such as Amazon GuardDuty and leverages Alert Logic to gain additional security context, actionable remediation steps, and protection.
Watch Now

Spotlight

Social engineering has become a highly prevalent method used by hackers in the past few years. Virus and malware design no longer needs to be as sophisticated as it once was, mainly because hackers have learned to manipulate victims into uploading malware themselves which eliminates the necessity to create malware that infiltrates on its own. If you’ve ever received an email stating that someone has a crush on you and a click of a link will reveal that person, you have experienced human hacking first-hand. If you were to actually click on that link, your computer would likely be immediately infected with spyware that could put your computer in a death grip and pull private data from your hard disk.

OTHER ON-DEMAND WEBINARS

Enhancing Cyber Security in Public Sector through Artificial Intelligence (AI)

Protect data confidentiality, personally identifiable information (PII), intellectual property, and industry information systems from the risk of data breach, damage and theft.
Watch Now

Accelerating Application Security to the Speed of Modern Development

Join Chief Revenue Officer Dave Gerry and Vice President of Products Jeff Lawson for a visionary perspective on how NTT Application Security is once again redefining application security, just as we did 20 years ago as WhiteHat Security. In this webinar on demand, Dave and Jeff will introduce our WhiteHat Vantage Platform and how it strategically layers three lightning-fast, purpose-built testing solutions at the most critical inflection points of your SDLC, allowing your developers and security teams to focus on priority items.
Watch Now

Kali Linux Overview: Tips, Tricks and Traps for Cybersecurity Professionals

CompTIA

Dr. James Stanger, CompTIA's Chief Technology Evangelist, has consulted with corporations, governments and learning institutions worldwide about cybersecurity, open source, network administration and help desk management for over 20 years. Organizations he has worked with include RSA, IBM, NTT Japan, Symantec, the Scottish Qualifications Authority (SQA), the US Department of Defense (DoD), the United Arab Emirates Cultural Division, the US Department of State, Meisei University, and General Dynamics.
Watch Now

HOW CAN YOU DEFEND YOURSELF IF YOU DON'T KNOW WHAT'S ON THE HORIZON?

SurfWatch Labs

SurfWatch serves as our threat intelligence team, providing us with critical link analyses and insights to proactively address any potential cyber threats to our customers and our business. Knowing what cyber threat and Dark Web activity is occurring helps us ensure the safeguarding of customer information and focus our cybersecurity efforts in the right areas.
Watch Now

Spotlight

Social engineering has become a highly prevalent method used by hackers in the past few years. Virus and malware design no longer needs to be as sophisticated as it once was, mainly because hackers have learned to manipulate victims into uploading malware themselves which eliminates the necessity to create malware that infiltrates on its own. If you’ve ever received an email stating that someone has a crush on you and a click of a link will reveal that person, you have experienced human hacking first-hand. If you were to actually click on that link, your computer would likely be immediately infected with spyware that could put your computer in a death grip and pull private data from your hard disk.

resources