How Secure are our Voting Systems for November 2018?
Dark Reading Videos | 9/14/2018 | Anomali CEO Hugh Njemanze discusses the importance of sharing threat intelligence across the country’s highly decentralized voting systems to safeguard the integrity of upcoming elections.
How Better Intel Can Reduce, Prevent Payment Card Fraud
Dark Reading Videos | 8/20/2018 | Royal Bank of Canada machine learning researcher and Terbium Labs chief scientist discuss how they use intelligence about the carding market to predict the next payment card fraud victims.
The Economics of AI-Enabled Security
Dark Reading Videos | 8/17/2018 | While AI greatly enhances security, Securonix CTO Tanuj Gulati points out the need for predictable cost models that insulate SOCs from the variables of massive data volume and intense real-time processing.
Filtering the Threat Intelligence Tsunami
Dark Reading Videos | 8/17/2018 | Reversing Labs CEO Mario Vuksan contends that SOCs are overwhelmed by global threat intelligence, and can benefit more from a targeted "pull" model that focuses on YARA-type binary pattern matching.
Leveraging the Power of your End-Users’ Human Cognition
Dark Reading Videos | 8/17/2018 | Cofense CEO Rohyt Belani makes a case for more aggressively leveraging the unique ability of your most perceptive and well-trained end-users to help you more quickly spot and stop email threats.
Crowd-sourcing Threat Intelligence & Response Guidance
Dark Reading Videos | 8/17/2018 | AlienVault SVP Russ Spitler encourages participation in the large-scale crowdsourced OTX threat intelligence community — as well as the rich expertise of “crowd-curated” response guidance.
The Active Directory Botnet
Dark Reading Videos | 8/30/2017 | It's a nightmare of an implementation error with no easy fix. Ty Miller and Paul Kalinin explain how and why an attacker could build an entire botnet inside your organization.
The Shadow Brokers: How They Changed 'Cyber Fear'
Dark Reading Videos | 8/17/2017 | At Black Hat USA, Matt Suiche, founder of Comae Technologies, describes what we know about the Shadow Brokers and how they have changed the business of cyber fear.
How to Handle Threats When Short-Staffed
Dark Reading Videos | 2/3/2017 | Skybox’s Michelle Cobb, VP of Worldwide Marketing, explains how automation and advanced analytics can give security teams the data they need when their teams are stretched
Cybercriminals' Superior Business Savvy Keeps Them Ahead
Dark Reading Videos | 9/30/2016 | Rick Holland of Digital Shadows explains how the attackers' superior business agility, faster change management, specialized job force, lower barriers to entry and bulletproof hosting keeps them ahead of the good guys.
The Threat Of Security Analytics Complexity
Dark Reading Videos | 3/23/2016 | Congratulations! You're protecting your organization with layered security...but now you're drowning in more security analytics data flows than you can handle.
In Brief: Transforming SOCs to SICs
Dark Reading Videos | 3/22/2016 | SPONSORED: Greg Boison, director of homeland and cybersecurity for Lockheed Martin, talks to Brian Gillooly at the RSA Conference about how to transform a security operations center into a security intelligence center, and Lockheed Martin's approach. See the full interview here.
Visual Analytics And Threat Intelligence With Raffael Marty
Dark Reading Videos | 9/29/2015 | Raffael Marty, founder and CEO of PixlCloud, stops by Dark Reading News Desk at Black Hat to discuss how to harness security data, visualize it, and put it to use, so it's more than just pretty pictures.
Attribution & The Nation-State Malware Market
Dark Reading Videos | 9/10/2015 | Malware researcher Marion Marschalek visits the Dark Reading News Desk at Black Hat to discuss attribution and the legitimate market for nation-states where "malware" is in the eyes of the beholder.
Catching Attackers With A Security Delivery Platform
Dark Reading Videos | 8/27/2015 | Shehzad Merchant, CTO of Gigamon, visits the Dark Reading News Desk to discuss a platform for finding and containing attackers once they've broken through your perimeter defense.
|