Crowd-sourcing Threat Intelligence & Response Guidance
Dark Reading Videos | 8/17/2018 | AlienVault SVP Russ Spitler encourages participation in the large-scale crowdsourced OTX threat intelligence community — as well as the rich expertise of “crowd-curated” response guidance.
Simplifying Endpoint Hardening, Defense & Response
Dark Reading Videos | 8/17/2018 | Ziften CEO Mike Hamilton advocates taking complexity, time, and cost out of multi-faceted endpoint protection, with a single-agent solution for laptops, desktops, servers, and cloud VMs.
Simplifying Defense Across the MITRE ATT&CK Matrix
Dark Reading Videos | 8/17/2018 | Endgame’s Mark Dufresne says SOCs can achieve better results within their existing staff and budget constraints with AI- and visualization-empowered, unified defense across the MITRE ATT&CK™ matrix.
The Rise of Bespoke Ransomware
Dark Reading Videos | 8/17/2018 | Drawing from a recent study by SophosLabs, Principal Research Scientist Chester Wisniewski highlights a shift to the rise of more targeted and sophisticated ransomware threats, such as SamSam.
RiskSense Platform Demonstration
Sponsored Video-Security Now | 5/3/2018 | Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a vulnerability management and cyber risk platform, which helps companies manage their cyber risks through their vulnerabilities.
Janus' Approach to Enterprise Security: BIOS-Based Endpoint Security Solution
Sponsored Video-Security Now | 5/2/2018 | Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice president of business development at Janus Technologies, discusses and gives us a demo of each of their new security releases.
Free endpoint scanning service powered by Open Threat Exchange
Dark Reading Videos | 4/19/2018 | Russ Spitler, AlienVault’s SVP of Products, explains how security pros can leverage the community-powered threat intelligence of OTX – which sees more than 19 million IoCs contributed daily by a global community of 80,000 peers – to quickly protect themselves against emerging attacks.
Can machine learning improve your endpoint detection and response?
Dark Reading Videos | 4/19/2018 | To intervene with optimum efficiency, response team needs to zero in on the most potentially dangerous endpoint anomalies first. And according to Harish Agastya, VP of Enterprise Solutions at Bitdefender, machine learning-assisted EDR can help you do exactly that.
Successfully Using Deception Against APTs
Dark Reading Videos | 4/19/2018 | According to Illusive CEO Ofer Israeli, deception technology can provide a vital layer of protection from advanced persistent threats (APTs) by presenting attackers with seemingly genuine servers that both divert them from high-value digital assets and make it easier to pinpoint malicious network activity.
Should CISOs Be Hackers?
Dark Reading Videos | 4/19/2018 | Justin Calmus, Chief Security Officer at OneLogin, believes that cybersecurity professionals – including CISOs and other security team leaders – can be much more effective at their jobs if they stay actively engaged with hacking communities that keep them on their toes and give them deep insight into attack trends.
Protecting Data Anywhere and Everywhere
Dark Reading Videos | 4/19/2018 | SecurityFirst CEO Jim Varner explains how resellers and MSPs can work with their clients to ensure that all of their business-critical data everywhere can be kept safe from attackers and readily available for disaster recovery – even as threats intensify and digital assets are dispersed across multiple clouds.
Supporting Infosec Needs for Cybersecurity Speed, Scope and Skills
Dark Reading Videos | 4/19/2018 | Given intensifying threats and limited infosec budgets, Endgame CTO Jamie Butler suggests that security leaders deploy tools that leverage machine learning, chatbots, and other technologies to make Tier 1/Tier 2 staff much more effective at stopping even relatively sophisticated attacks.
Using Carrier Intelligence to Validate Mobile User Identity
Dark Reading Videos | 4/19/2018 | To confidently validate the identity of mobile users without adding business-killing friction to login and on-boarding processes, Lea Tarnowski and Wendell Brown of Averon suggest leveraging the intelligence mobile carriers already have about their customers.
Stopping Bots and Credential Stuffing: A Smarter Strategy
Dark Reading Videos | 4/18/2018 | Patrick Sullivan, Senior Director Security Strategy at Akamai Technologies, explains why cybersecurity teams need better mechanisms for controlling bot activity – and why all bots are not created equal.
Leveraging Threat Intelligence across Infosec Roles
Dark Reading Videos | 4/18/2018 | Allan Liska, Senior Security Architect at Recorded Future, believes everyone in the infosec team – including vulnerability management and threat response staff – can take greater advantage of available threat intelligence to more effectively and efficiently mitigate risk.
Practically Applying Threat Intelligence to Your Business
Dark Reading Videos | 4/18/2018 | Travis Farral, Director of Security Strategy at Anomali, believes cybersecurity teams can operate much more efficiently by better identifying the specific threats that endanger their environment – and by better understanding the potential impacts of those specific threats.
Enabling Appropriate User Access in a “Zero Trust” World
Dark Reading Videos | 4/18/2018 | Bill Mann, Chief Product Officer at Centrify, suggests some strategies for securing today’s perimeter-less enterprise environments – including stronger enforcement of well-defined policies for user access, integration of security into DevOps processes, and smarter use of ML for anomaly detection.
Keeping the Business Safe Across Hybrid Cloud Environments
Dark Reading Videos | 4/18/2018 | Aggressive cloud adoption increases threat surface and makes it more difficult for infosec teams to keep track of what the business is doing. Donald Meyer, Head of Data Center and Cloud at Check Point Software, explains how infosec teams can more effectively mitigate risk without hampering business agility.
Beating Zero-Payload/Fileless Attacks with Unified EPP/EDR
Dark Reading Videos | 4/18/2018 | To cope with today’s fileless endpoint attacks – especially those that aren’t precisely similar to previously known exploits – Tomer Weingarten and Nicholas Warner of SentinelOne suggest a unified EPP/EDR approach that includes visibility into the dangers lurking within encrypted network traffic.
Optimizing the Security Awareness of Your End-Users
Dark Reading Videos | 4/18/2018 | End-users can be the weakest link in your infosec defense. But according to KnowBe4 founder and CEO Stu Sjouwerman, there is something you can do about that – if you implement the right behavioral diagnostics and focus your training needs on individual users’ actual weaknesses.
How Companies Avoid Doing Business With Sanctioned Entities
Security TV | 10/10/2017 | Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., Russia and Iran) or individuals (e.g., drug dealers or terrorists) sanctioned by the US government. In this video, Bureau van Dijk's Anders Rodenberg explains the Office of Foreign Assets Control (OFAC) '50% rule' and how companies can ensure they're in compliance with it.
How Security Metrics Fail Us & How We Fail Them
Dark Reading Videos | 9/26/2017 | Joseph Carson of Thycotic discusses how infosec professionals buy security products they don't need and make other bad decisions, because of poor use of metrics.
Attacking Developers Using 'Shadow Containers'
Dark Reading Videos | 9/15/2017 | Sagie Dulce describes why developers are such attractive targets and how the Docker API can be exploited to use one of developers' favorite tools against them in sneaky, obfuscated attacks.
Tesla Hacks: The Good, The Bad, & The Ugly
Dark Reading Videos | 9/12/2017 | Keen Security Lab found multiple holes in the isolation layer Tesla uses to protect drive systems from infotainment systems, but were impressed by the auto company's security in other ways.
Virtual Terrorism: 21st Century Cyber Warfare
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways that governments strategically use cyber warfare, how the 'virtual caliphate' recruits terrorists online as well as the future threats posed by new technologies like biometrics, drones and self-driving cars.
Mikko Hypponen's Vision of the Cybersecurity Future
Dark Reading Videos | 9/4/2017 | Twenty years from now, will everything be in the Internet of Things, and if so, how does the security industry need to prepare? F-Secure's chief research officer weighs in on this and what else the future promises (and threatens).
Using Market Pressures to Improve Cybersecurity
Dark Reading Videos | 8/31/2017 | Post-MedSec, Chris Wysopal discusses what impact the investor community -- if not consumers -- can have on squashing vulnerabilities and improving cybersecurity.
The Active Directory Botnet
Dark Reading Videos | 8/30/2017 | It's a nightmare of an implementation error with no easy fix. Ty Miller and Paul Kalinin explain how and why an attacker could build an entire botnet inside your organization.
IoTCandyJar: A HoneyPot for any IoT Device
Dark Reading Videos | 8/29/2017 | Palo Alto Networks researchers explain how they designed an affordable, behavior-based honeypot to detect attacks on an IoT device -- any kind of IoT device.
Turning Sound Into Keystrokes: Skype & Type
Dark Reading Videos | 8/25/2017 | Don't let your fingers do the talking in a Skype session. The callers on the other end could know what you're writing, researcher Daniele Lain explains.
ShieldFS Hits 'Rewind' on Ransomware
Dark Reading Videos | 8/18/2017 | Federico Maggi and Andrea Continella discuss a new tool to protect filesystems by disrupting and undoing ransomware's encryption activities.
The Shadow Brokers: How They Changed 'Cyber Fear'
Dark Reading Videos | 8/17/2017 | At Black Hat USA, Matt Suiche, founder of Comae Technologies, describes what we know about the Shadow Brokers and how they have changed the business of cyber fear.
|