What's Your DNS Security Risk? Insights from Recent Ponemon Survey

Have you ever done an assessment on how secure your DNS infrastructure is? Ponemon Institute has recently completed the first DNS Security Risk Survey among global organizations to understand how secure they are when it comes to malware and data exfiltration that uses DNS. The survey also provides insights into: The level of visibility these organizations have, especially in today’s complex network deployments. Their use of threat intelligence and the effectiveness of threat intelligence. The efficiency of their security operations.
Watch Now



Top Ten Ways to Handle Contracts Effectively In-House

Handling a large number of contracts is a fact of life for most in-house attorneys – with an ever-increasing volume and tight deadlines, even before a M&A or other event triggers a voluminous contract review. But it doesn’t have to be chaotic or disorganized: with the right processes and tools you can provide strong, responsive
Watch Now

On Demand Utilizing Data to Eradicate Threats With Splunk & Zscaler

Modern zero trust requires the right architecture, analytics, dynamic policy, and risk visibility in order to reduce the attack surface, prevent lateral movement, and make real-time threat determinations with each transaction. Zscaler and Splunk tightly integrate best-of-breed cloud security and security analytics platforms to
Watch Now

SANS Top New Attacks and Threat Report


Each year, the annual RSA Conference in San Francisco features top SANS instructors presenting their look at the new attack techniques currently in use and their projections for future exploits. This fast-paced panel--moderated by Alan Paller and featuring Heather Mahalik, Ed Skoudis and Johannes Ullrich--is one of the highest-rated keynote sessions at the conference. In this webcast, SANS Director of Emerging Technologies John Pescatore will highlight: The top new attacks and threats as defined in that presentation.
Watch Now

Industrial Cybersecurity: Is Your Facility Protected?

Just last year, cybercriminals attempted to poison the water supply in Florida by hacking into a city’s system. An airplane manufacturer’s confidential customer data files were breached and leaked on the Internet. A major gas pipeline was shut down by a ransomware attack. A major meat producer was forced to close down all its plants. Hackers are now targeting industrial and infrastructure. At the same time, more and more facilities are going to connected operations to empower new efficiencies. How do we keep our facilities protected amid these growing dangers and opportunities?
Watch Now