Featured
202 DBIR Presents Ep.4: Basic Web Application Attacks
Verizon
The2024 Data Breach Investigations Report (DBIR), now in its 17th year, provides an in depth analysis of data-driven, real-world instances of cybercrime and how cyberattacks play out across organizations of different sizes as well as from different verticals and disparate geographic locations.
Basic Web Application Attacks breaches and incidents tend to be largely driven by attacks against credentials and then leveraging those stolen credentials to access a variety of resources. These breaches represented 8% of the dataset.
In this webinar you will learn:
Key Findings of 2024 Data Breach Investigations Report
How you can help prevent breaches and make applications, data and services more difficult for attackers to infiltrate inaccessible to attackers while allowing trusted users to securely connect to protected resources using a zero trust strategy
How a zero trust approach can provide better support for remote users more effectively
All episodes
-
2024 DBIR Presents Ep. 1: Social Engineering
Verizon
The 2024 Data Breach Investigations Report (DBIR), now in its 17th year, provides an in depth analysis of data-driven, real-world instances of cybercrime and how cyberattacks play out across organizations of different sizes as well as from different verticals and disparate geographic locations.
More than two-thirds (68%) of breaches involved a non-malicious human element. These breaches were caused by a person who either fell victim to a Social Engineering attack or made some type of Error.
In this webinar you will learn:
- Key Findings of the 2024 Data Breach Investigations Report
- How social engineering attacks have become more difficult to detect
- The components of a sample end- to -end social engineering defense plan
- How to use a mobile threat defense (MTD) solution to help protect devices from the ever evolving social engineering attacks
- How to use a mobile device management (MDM) solution to help manage devices, employee access, privileges and policies to better control vulnerabilities in software and hardware -
2024 DBIR Presents Ep.2: Ransomware
Verizon
The 2024 Data Breach Investigations Report (DBIR), now in its 17th year, provides an in depth analysis of data-driven, real-world instances of cybercrime and how cyberattacks play out across organizations of different sizes as well as from different verticals and disparate geographic locations.
One of the 2024 DBIR key highlights is roughly one-third of all breaches involved Ransomware or some other Extortion technique. Pure Extortion attacks have risen over the past year and are now a component of 9% of all breaches. Ransomware was a top threat across 92% of industries.
In this webinar you will learn:
- Key Findings of 2024 Data Breach Investigations Report.
- How you can reduce the threat of Ransomware with comprehensive, programmatic and maturity-based risk assessments that assess IT enterprise assets and brand reputation.
- How simulations can help to improve End Point Detection and Response, Blue Team readiness and Employee training.
- How having quantifiable financial data on the cost of threats can inform investment decisions to help close security gaps.
- How to augment your response capabilities when confronted with an escalated ransomware attack. -
2024 DBIR Presents Ep. 3: Denial of Service
Verizon
The 2024 Data Breach Investigations Report (DBIR), now in its 17th year, provides an in depth analysis of data-driven, real-world instances of cybercrime and how cyberattacks play out across organizations of different sizes as well as from different verticals and disparate geographic locations.
One of the 2024 DBIR key highlights is Denial of Service was responsible for 55% of incidents analyzed this year.
-
202 DBIR Presents Ep.4: Basic Web Application Attacks
Verizon
The2024 Data Breach Investigations Report (DBIR), now in its 17th year, provides an in depth analysis of data-driven, real-world instances of cybercrime and how cyberattacks play out across organizations of different sizes as well as from different verticals and disparate geographic locations.
Basic Web Application Attacks breaches and incidents tend to be largely driven by attacks against credentials and then leveraging those stolen credentials to access a variety of resources. These breaches represented 8% of the dataset.
In this webinar you will learn:Key Findings of 2024 Data Breach Investigations Report
How you can help prevent breaches and make applications, data and services more difficult for attackers to infiltrate inaccessible to attackers while allowing trusted users to securely connect to protected resources using a zero trust strategy
How a zero trust approach can provide better support for remote users more effectively