On-Demand Webinar | July, 13, 2015 Watch the replay!
This webcast is a high level summary of the Elastic Botnet Report released by Novetta June 11, 2015. The report details exploits of an ElasticSearch vulnerability to create distributed denial-of-service (DDoS) botnet infrastructures using the Elknot and BillGates DDoS malware families, and includes:
* An overview of the vulnerability
* Specifics about the threat actors
* Analysis of the malware functionality
* Remediation steps to help detect and remove infections.
On-Demand Webinar | Recorded July 28, 2015
The U.S. DoD was constantly getting breached - none of the tools they had built or purchased were working to prevent this (including SIEMs and Security Analytics packages). Learn how they solved this problem using an advanced, network-traffic analytics solution.
An On-Demand Webinar | Recorded February 24, 2015Featuring Kim Jones, SVP, Chief Security Officer, Vantiv
In this presentation, we discuss the challenges and pitfalls associated with creating a true threat intelligence program as well as offer potential solutions for the practitioner to consider.
If a security analyst could see everything occurring on their network in real time, breaches would happen, but there would never be any damage or ex-filtration because response would be immediate. In a lot of ways, this would be the ideal cyber security solution, and would solve the scourge of breaches currently plaguing industry. This webinar discusses the technical details about how to get as close as possible to this ideal solution within real-world constraints.