Threat actors have access to all the security products, white papers and they even know how the internals of operating systems work. With all these crafts, information and tricks in hand they obfuscate the key components of malicious code to bypass security and antivirus systems. This webinar focuses on how obfuscation is used in malwares, types of obfuscation and how new age malwares carry obfuscated content that delays reversing process.
This session covers the importance of DNS, a critical component of the Internet and how it's used to identi...
Most Recent Videos
We’ll discuss how #networking and #security teams can keep roaming users safe without sacrificing performance and keep #securityoperations teams happy, too.
The average company has had to deal with more changes in 2020 than in previous years. Join our conversation as we discuss the IT security challenges these changes encounter and what organisations a
This 15-minute webinar will focus on the latest ways we’ve seen threat actors use the current health crisis in malicious campaigns.
Your information security program is the glue that holds together virtually all aspects of IT. It also defines your long-term outcomes in terms of business resilience. Watch this webinar to learn how.
Lots of network security providers claim they are the best. Well we’ve got proof! Brand new third-party research from AV-TEST reveals that Cisco Umbrella is the industry leader in security efficacy, a
Join Brian Roddy, VP of Cisco Cloud Security along with Product Managers Steve Brunetto and Adam Winn for an exploration into the cloud-delivered security services provided by Cisco Umbrella.
Join us for 20 minutes to learn some simple steps you can take to secure remote employees and students, without overburdening your staff.
La crise actuelle oblige les entreprises a massivement développer le télétravail et crée de nouveaux enjeux de sécurité. Les plateformes VPN sont extrêmement sollicitées. Afin de les soulager, nomb
Join us for an inside look at Cisco Umbrella’s product direction. Hear from John Amaral, Head of Product for Cisco Cloud Security.
How well do you really know your environment, your security practices and policies? Do you know your cyberattackers’ tools, techniques and the procedures that they use to exploit your vulnerabilities?
Get recommendations to help you shape your security for 2020 and keep it simple, scalable, and flexible.
Don't make a data breach any harder than it needs to be. We’ll walk you through the Xs and Os of any good security incident readiness and response playbook. View webcast now.
A well-run information security program requires not only great visibility but also the necessary control. Security around DNS is often the weak link. Whether it’s an automated computer transaction or
Did you know that ransomware is one of THE top concerns keeping CEOs up at night in 2020?
Find out how you can shorten your response time and garner the information you need to be effective in one central place. We’ll explain the steps you can take to detect and investigate threats faster.
In this webcast, view now to learn from cybersecurity expert Duncan McAlynn on how to protect and defend your organization against menacing attacks in 2020.
It’s been five years since the discovery of Emotet yet it’s still making a buzz. Join us for a short history and evolution of the Emotet malware based on our own investigation.
This session covers the importance of DNS, a critical component of the Internet and how it's used to identify malicious domains.
With the rocketing crypto market cap soaring up to $835 billion at its peak — the name of the game is computing power. Is your environment safe?
In this webinar, we will show you how to build a strong security posture and integrated defence system that will allow you to quickly respond to breaches.