With over a million security sensors around the world across more than 215 countries and territories, SonicWall has unique visibility into the evolution of the latest threats as well as their delivery mechanisms. In this presentation we will discuss what SonicWall threat researchers observed in 2021 and offer our analysis… Read More
- Post Type
- Blog
- Category
- Webinar
- Issues
- SonicWall
For many years, software or hardware vulnerabilities have received a “severity score,” a rating of how much damage the vulnerability could cause if malicious actors exploited it. However, this severity score does not provide defenders with a crucial piece of information – what is the likelihood that vulnerability will be… Read More
- Post Type
- Blog
- Category
- Webinar
Join Neil Jenkins, Chief Analytic Officer @CTA, and Dave Liebenberg, Head of Strategic Analysis @Cisco Talos, as they discuss the Talos Incident Response Year-in-Review for 2021. This talk will explore the top threats, initial vectors, and major security incidents that Cisco Talos Incident Response (CTIR) dealt with in 2021. In… Read More
- Post Type
- Blog
- Category
- Webinar
- Issues
- Cisco
While some sharing organizations have already lasted for multiple decades, long-term collaborative efforts have not been as common in the cybersecurity industry as in other business areas. So the fact that the Cyber Threat Alliance is turning five years old this January represents a major milestone for the sector. Increasing… Read More
- Post Type
- Blog
- Category
- Webinar
- Issues
- CTA
Join Neil Jenkins, Chief Analytic Officer @CTA, and Andrew Brandt, Principal Researcher @Sophos, as they discuss insights from the Sophos 2022 Threat Report. In its year-end analysis of the trends that shaped the threat landscape in 2021, and are likely to continue forward in 2022, Sophos will highlight the key… Read More
- Post Type
- Blog
- Category
- Webinar
- Issues
- Sophos
Palo Alto Networks Unit 42 cloud threat researchers wanted to understand how supply chain attacks occur in cloud-native applications. To gain insight into this growing threat, they analyzed data from a variety of public data sources around the world. Additionally, they executed a red team exercise at the request of… Read More
- Post Type
- Blog
- Category
- Webinar
- Issues
- Palo Alto Networks
In theory, theory and practice are the same. In practice, they are very different. Cybersecurity proves that aphorism true, as the gap between theoretically good cybersecurity and practical cybersecurity often seems enormous. Join Jaya Baloo (Avast), Jen Ellis (Rapid 7), Wendi Whitmore (Palo Alto Networks), and Michael Daniel as… Read More
- Post Type
- Blog
- Category
- Webinar
Join CTA and Dragos as we discuss public ICS/OT exploits for vulnerability prioritization with Jacob Baines, Principal Industrial Control Vulnerability Analyst @Dragos, and Neil Jenkins, Chief Analytic Officer @Cyber Threat Alliance. Dragos tracks thousands of CVE that affect industrial control systems and operational technology networks. Of these CVE, more than… Read More
- Post Type
- Blog
- Category
- Webinar
Botnets have long contributed to a variety of cybersecurity threats. With the emergence of the Internet of Things, botnets have grown to incorporate an ever-wider assortment of devices. In fact, Nokia’s 2019 Threat Intelligence Report indicated that 78% of detected events were attributable to Internet of Things bots. Combatting botnets… Read More
- Post Type
- Blog
- Category
- Webinar
Join CTA and NTT as we discuss insights from the 2021 NTT Global Threat Intelligence Report. The report reminds us that in a world of evolving cyberthreats, we need to try to stay ahead just to keep from falling behind. The session will discuss how attackers are taking advantage of… Read More
- Post Type
- Blog
- Category
- Webinar