This webinar examined the current data threat detection landscape, and assessed how data threat protection can be used to aid organizations in their information security strategies. View the recorded webinar here –
Deception-based solutions can provide a wealth of information about how adversaries behave as they attempt to complete their mission. Depending on the level of engagement organizations desire to setup in their deception solution, information gleaned can include basic...
What’s the biggest lesson from the SolarWinds fiasco? Just focusing security defenses on the most common means of penetrating an organization doesn’t cut it.
In this webinar, you will hear about advanced ransomware strains like Maze, Ryuk and REvil, that leverage APT style tactics and techniques to target Enterprises.