Filtering By Tag 'Security'
x clear filterWhat is Cloud Security?
The basics of cloud security and the best practices you need to stay secure.
Companies Face New Phishing Attacks Around COVID-19
Hackers are using email scams to leverage COVID-19 to their advantage. Here we share an article that helps bring to light some of the tactics used by adversaries, and what people can do to stay protected.
The Importance of Multi-factor Authentication for Your Remote Workers
Keep your remote team secure with a layered security approach.
Advanced DNS Attacks & Mitigation Techniques [Webinar]
The Domain Name System (DNS) is the address book for the entire internet. Your organization's internal DNS knows the IP address for every device on your network. When you request a domain is outside of your network, your request moves through a firewall and onto the internet. Attack techniques such as tunneling and malicious domain generation allow bad actors to utilize the DNS to compromise your network in a way that is difficult to detect and even more difficult to resolve.
Modern Threat Detection Using the MITRE ATT&CK Framework [Webinar]
TTPs, or Tactics, Techniques, and Procedures, framework the most effective modern threat hunting. Since they are descriptive, they characterize what adversaries are doing, and exactly how they are doing it. Although these characteristics are derived from individual incidents, they can be helpful in developing contextual understanding across a general threat landscape
Enhancing your Zero Trust Approach to Access Management with Context and Risk [Webinar]
A Verizon Report recently found that far more breaches are stemming from identity tactics than network vulnerabilities. Watch this webinar to learn how addressing identity technology can deter hackers and insider threats to better protect your organization.
If You Want to Catch More Phish, Use More Hooks [Webinar]
Within the past two years, the number of non-signature based attacks has increased significantly. These attacks, like name impersonations and domain lookalikes, have become so sophisticated that they're nearly impossible to tell apart from the real thing. Watch this webinar to learn how to better secure your mailboxes with IRONSCALES.
The Power of Security Metrics in Your Organization [Webinar]
Businesses are turning to third-party vendors to help conduct day-to-day operations. While that often allows for the most efficient use of resources, it presents a challenge: how do you ensure that your third-party vendor's business practices are as safe and secure as your own?
Watch the webinar to see why current methods for measuring vendor security fall shot, and how to get a full picture of their security posture.
What Is the Importance of a Web Application Firewall?
Simply installing a firewall isn't enough to keep your computer network safe. Adversaries are always evolving their attack processes, leading to a steady increase in data breaches in the United States since 2008.
Read on for more on how a Web Application Firewall can be a cost-effective way to better protect your network.
Bringing Endpoint Detection & Response into the Modern Age [Webinar]
Most security breaches happen at the endpoint because they are the most mobile, utilize the most applications, and are made vulnerable by human use. It's no surprise, then, that hackers are always evolving their strategies to defeat endpoint security protocols. Watch this webinar to learn more about protecting your devices from attacks that are hitting your networks.