How Secure are our Voting Systems for November 2018?
Dark Reading Videos | 9/14/2018 | Anomali CEO Hugh Njemanze discusses the importance of sharing threat intelligence across the country’s highly decentralized voting systems to safeguard the integrity of upcoming elections.
How Better Intel Can Reduce, Prevent Payment Card Fraud
Dark Reading Videos | 8/20/2018 | Royal Bank of Canada machine learning researcher and Terbium Labs chief scientist discuss how they use intelligence about the carding market to predict the next payment card fraud victims.
Malicious Cryptomining & Other Shifting Threats
Dark Reading Videos | 8/17/2018 | Skybox Security CMO Michelle Johnson Cobb discloses research results that include a spike in malicious cryptomining during Bitcoin’s peak, a shift to outside-the-perimeter mobile threats, and more.
The Economics of AI-Enabled Security
Dark Reading Videos | 8/17/2018 | While AI greatly enhances security, Securonix CTO Tanuj Gulati points out the need for predictable cost models that insulate SOCs from the variables of massive data volume and intense real-time processing.
Using Threat Deception on Malicious Insiders
Dark Reading Videos | 8/17/2018 | Illusive Networks CEO Ofer Israeli reveals how distributed deception technology can be as effective against insider threats as it is against outsiders, since it thwarts the lateral movement common to both.
Filtering the Threat Intelligence Tsunami
Dark Reading Videos | 8/17/2018 | Reversing Labs CEO Mario Vuksan contends that SOCs are overwhelmed by global threat intelligence, and can benefit more from a targeted "pull" model that focuses on YARA-type binary pattern matching.
Ensuring Web Applications Are Hardened, Secure
Dark Reading Videos | 8/17/2018 | Ofer Maor of Synopsys Software Integrity Group describes how automated testing can non-intrusively pinpoint where developers may be inadvertently exposing data and/or violating compliance mandates.
Supplementing the SOC with Cyber-as-a-Service
Dark Reading Videos | 8/17/2018 | Raytheon Cyber Protection Solutions CTO Mark Orlando suggests under-resourced SOCs enhance their effectiveness at-scale by tapping the advanced cyber defense automation his company has developed.
Leveraging the Power of your End-Users’ Human Cognition
Dark Reading Videos | 8/17/2018 | Cofense CEO Rohyt Belani makes a case for more aggressively leveraging the unique ability of your most perceptive and well-trained end-users to help you more quickly spot and stop email threats.
How Orchestration, Automation Help SOCs Do More With Less
Dark Reading Videos | 8/17/2018 | Splunk’s Haiyan Song and Oliver Friedrichs - co-founder of recently acquired Phantom - explain how security orchestration, automation, and response (SOAR) can empower SOCs to do more with less.
Simplifying Defense Across the MITRE ATT&CK Matrix
Dark Reading Videos | 8/17/2018 | Endgame’s Mark Dufresne says SOCs can achieve better results within their existing staff and budget constraints with AI- and visualization-empowered, unified defense across the MITRE ATT&CK™ matrix.
The Rise of Bespoke Ransomware
Dark Reading Videos | 8/17/2018 | Drawing from a recent study by SophosLabs, Principal Research Scientist Chester Wisniewski highlights a shift to the rise of more targeted and sophisticated ransomware threats, such as SamSam.
How Security Metrics Fail Us & How We Fail Them
Dark Reading Videos | 9/26/2017 | Joseph Carson of Thycotic discusses how infosec professionals buy security products they don't need and make other bad decisions, because of poor use of metrics.
Attacking Developers Using 'Shadow Containers'
Dark Reading Videos | 9/15/2017 | Sagie Dulce describes why developers are such attractive targets and how the Docker API can be exploited to use one of developers' favorite tools against them in sneaky, obfuscated attacks.
Tesla Hacks: The Good, The Bad, & The Ugly
Dark Reading Videos | 9/12/2017 | Keen Security Lab found multiple holes in the isolation layer Tesla uses to protect drive systems from infotainment systems, but were impressed by the auto company's security in other ways.
Mikko Hypponen's Vision of the Cybersecurity Future
Dark Reading Videos | 9/4/2017 | Twenty years from now, will everything be in the Internet of Things, and if so, how does the security industry need to prepare? F-Secure's chief research officer weighs in on this and what else the future promises (and threatens).
Using Market Pressures to Improve Cybersecurity
Dark Reading Videos | 8/31/2017 | Post-MedSec, Chris Wysopal discusses what impact the investor community -- if not consumers -- can have on squashing vulnerabilities and improving cybersecurity.
The Active Directory Botnet
Dark Reading Videos | 8/30/2017 | It's a nightmare of an implementation error with no easy fix. Ty Miller and Paul Kalinin explain how and why an attacker could build an entire botnet inside your organization.
IoTCandyJar: A HoneyPot for any IoT Device
Dark Reading Videos | 8/29/2017 | Palo Alto Networks researchers explain how they designed an affordable, behavior-based honeypot to detect attacks on an IoT device -- any kind of IoT device.
ShieldFS Hits 'Rewind' on Ransomware
Dark Reading Videos | 8/18/2017 | Federico Maggi and Andrea Continella discuss a new tool to protect filesystems by disrupting and undoing ransomware's encryption activities.
The Shadow Brokers: How They Changed 'Cyber Fear'
Dark Reading Videos | 8/17/2017 | At Black Hat USA, Matt Suiche, founder of Comae Technologies, describes what we know about the Shadow Brokers and how they have changed the business of cyber fear.
How Windows 10 Stops Script-Based Attacks On The Fly
Dark Reading Videos | 9/21/2016 | Move over Apple 'Walled Garden.' Windows 10's new antimalware scan interface halts scripts by signing code on the fly... but does it work? Security researcher Nikhil Mittal takes a look.
|