As businesses settle into a hybrid world of on-prem, public cloud, private cloud infrastructure with security delivered as a service and all of this overlaid with the concept to Zero Trust, what is left? Companies will have the data they are trying to protect and the identity of the user trying to access something. As life on th
Watch Now
Tenable
Get the visibility you need to build an effective cyber exposure plan. You know authenticated or credentialed scanning provides more detail about your existing assets, along with the deepest possible understanding of the exposures in your environment. So why aren’t you taking more advantage of authenticated scanning? When we talk to security professionals who are hesitant to run credentialed scans, their story hasn't changed much in over 8 years. Two things stand out: Lack of trust. They're uncomfortable inputting credentials into a third-party, less-trusted source. Too much information. The tsunami of data generated by credentialed scanning is challenging to prioritize. If you're not taking full advantage of credentialed scanning, you need to watch this on-demand webinar to learn how Tenable and CyberArk integrate to: Provide details on what don’t you know about your environment, giving you a complete cyber exposure view.
Watch Now
Link11
2018 is the year of high volume DDoS attacks. Since the emergence of the new attack vector memcached reflection in February, new bandwidth records have been set. Companies worldwide suddenly found themselves exposed to a new DDoS risk. In a webinar, the Link11 IT security experts Karsten Desler and Aatish Pattni explain how to assess the threats. Today's global IT infrastructures face a DDoS threat that has never existed before with such massive bandwidths. This issue relates to attack vectors, which can hit companies with a really destructive attack volume due to enormous amplification factors. The largest possible 'amplification reflection vector' to date has been detected in memcached reflection attacks. Cyber criminals can theoretically use the vector to increase their attacks by a factor of 50,000.
Watch Now
InfoSec Institute
Digital forensics is the backbone of investigating cybercrime. It includes identifying, preserving, extracting, analyzing and reporting evidence across computers, mobile devices and networks. Join Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security, for this on-demand webinar as we discuss: The difference between computer, mobile and network forensics. How a forensics certification can progress your career.
Watch Now