Decoys, Lures and Breadcrumbs:Deception Technology Turns the Tables on Attackers About this WebinarThe use of deception technology designed to throw off stealthy attackers from real assets and gather intelligence about how they operate is gaining ground in the...
This webinar examined the current data threat detection landscape, and assessed how data threat protection can be used to aid organizations in their information security strategies. View the recorded webinar here –
What’s the biggest lesson from the SolarWinds fiasco? Just focusing security defenses on the most common means of penetrating an organization doesn’t cut it.
In this webinar, you will hear about advanced ransomware strains like Maze, Ryuk and REvil, that leverage APT style tactics and techniques to target Enterprises.