You searched for cyber | Page 11 of 14 | SC Media

Your search for cyber returned 132 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

WebCast remove

Your search for cyber returned 132 results

Sort Results:

Relevant Recent
WebCast

SOC-as-a-Service: Detect, Investigate, and Resolve Threats Faster

In this democast, we’ll discuss how SOC-as-a-Service can help, and what to look for in a modern managed security service provider (MSSP). We’ll also provide a demo of our cloud native ActiveEye platform which offers complete visibility into your cloud, endpoint, and network security, along with 24x7 expert support to detect, investigate, and resolve threats faster.
WebCast

Uncovering advanced persistent threats

Join us for a step-by-step walk through of how the Operation Cloud Hopper attack unfolded and how security professionals can implement automated defenses to detect malicious behavior like APT10's attack before the breach occurs.
WebCast

Prevent, detect and respond to ransomware

Prevent, detect and respond to ransomware DECEMBER 2 & 3, 2020 10:30 am – 4:00 pm EDT WannaCry put security leaders on notice when it comes to ransomware. Since then, attacks have skyrocketed, with the FBI reporting that businesses and individuals lost billions of dollars, due to cybercriminals’ use of malicious software. This remote, digital shakedown has quickly become the preferred method for many digital marauders to prey on all kinds of organizations.
WebCast

Closing security gaps in hybrid and multi-cloud environments

Digital transformation initiatives have led many companies and organizations to adopt cloud services. While this has boosted operational agility and unlocked new revenue sources, it has left information security teams with multiple new environments to secure, test and monitor. Especially for those who work in hybrid or multi-cloud environments, understanding your organization’s cloud attack surface requires new thinking and may even demand a security overhaul. To be sure, achieving absolute visibility is always difficult, but innovative approaches, and new combinations of techniques and tools, are proving effective for organizations whose network extensions have left them outside their comfort zone.
WebCast

Malware is constantly evolving – Are you?

Though malware has continued to evolve, its delivery mechanism has remained a constant: According to the 2019 Verizon Data Breach Investigations Report, 94 percent of malware was delivered by email. In recent years, the explosion in ransomware attacks has rightly taken center stage when it comes to malware analysis. Evaluating the more than half a million instances reported in 2019, security firm Emsisoft estimates an aggregate ransom demand exposure of more than $6.3 billion.
WebCast

APTs expanding reach: Understanding the risk of persistent threats

APTs expanding reach: Understanding the risk of persistent threats January 26 & 27, 2021 Many — perhaps most — security professionals do not build their threat models around cyberespionage, but that approach is changing. Yes, state-sponsored hackers tend to go after bigger fish, but hackers-for-hire are leveraging the same tactics once used by state-sponsored APT groups to target smaller companies — especially as more small organizations increase their operations’ digital reach. Other bad actors treat small and mid-sized companies as points-of-access to get to larger targets they may do business with.