Why Security Awareness Should Not Stop at Phishing

Mediapro

If you’re keeping even half an eye on the InfoSec news cycle, you know how big of a problem phishing is. The annual Verizon data breach found again this year that phishing was the leading way for malware to enter networks, with the average company reporting that 94% of detected malware came in via email. Thirty-two percent of confirmed breaches started with phishing, again the most common tactic. It makes sense, then, that so much security awareness content out there is focused on this threat. Some vendors make their business on it almost completely, with this trend extending to the phishing simulator emerging as a key selling point for those in the security awareness business.
Watch Now

Spotlight

Noname Security just released the new Recon module in our API security platform. With Recon, you can search for exploitable intelligence just like the hackers do and identify the attack paths available to cybercriminals.

OTHER ON-DEMAND WEBINARS

Integrating IT & OT Security, addressing cyber risks and pitfalls through innovation: A Roadmap

Our cybersecurity experts Sharath Acharya and Prayukth K V as they discuss the roadmap to Integrating IT & OT Security, addressing cyber risks and pitfalls through innovation. This On-Demand webinar will offer critical insights for evolving an enterprise-wide strategy to ensure adequate IT and OT security integration and closure of postural gaps and security deficiencies.
Watch Now

Playbook For Defending Your Network And Reducing The Risk Of A Cyberattack

Cybersecurity Ventures

When was the last time you had a breach? Are you sure? Today’s attackers are remarkably sophisticated—and can lie in wait for months before you even notice their presence. Here’s the hard truth: if you haven’t detected an attack/compromise in the last 12 months, it is NOT because it’s not happening – it’s because you’re not looking in the right places. A compromise in your network is inevitable – if it isn’t already happening now, it will soon. Given that 100% security simply doesn’t exist, what can you do to control and minimize the damage from attacks? In this previously recorded webinar, my firm will provide a playbook for approaching organizational security from this perspective. You’ll learn how a proper foundation for security is key, followed by proactive threat hunting and active defense.
Watch Now

How Zero Trust can help protect financial services networks

Forescout

Is Zero Trust really achievable given the complexity in financial service organisations, especially considering limited staff, mergers and acquisitions and compliance pressures? Join SC and ForeScout to learn how to embrace Zero Trust to: Proactively combat today’s high frequency and sophistication of cyberattack. Gain unparalleled situational awareness of malicious activity. Prevent the transfer of sensitive data and money. Simplify adherence to compliance regulations.
Watch Now

Endpoint Security Got You Down? No PowerShell? No Problem

Black Hills Information Security

Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs & Windows Defender every time you need to pop a box? In this one-hour webcast, we introduce a somewhat new Red Team approach that we call BYOI (Bring Your Own Interpreter). Turns out, by harnessing the powah of C# and the .NET framework you can embed entire interpreters inside of a C# binary. This allows you to dynamically access all of the .NET API from a scripting language of your choosing without going through Powershell in any way! We also cover some basic .NET & C# concepts in order to understand why this is possible and all the hype surrounding offensive C# tradecraft.
Watch Now

Spotlight

Noname Security just released the new Recon module in our API security platform. With Recon, you can search for exploitable intelligence just like the hackers do and identify the attack paths available to cybercriminals.

resources