Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Why Healthcare Must Urgently Enhance Data Security

In this episode of CISO Conversations: EU Data Regulations, Nicolas Groh, Field CTO at Rubrik, is joined by Anastasiya Kiseleva, a PhD Researcher in Law, Health, and Technologist at the Vrije Universiteit Brussel, John Noble, Former Non-Executive Director at NHS England, and Dr. Stefan Buttigieg, Resident Specialist in Public Health Medicine at the Ministry for Health and Active Aging in Malta.

How Are People Targeted With Malware

Malicious software, also known as malware, is a program that is designed to harm computer systems and devices. Cybercriminals target individuals with malware by creating spoofed websites, sending fake emails or messages, executing drive-by download attacks or deceiving users to download programs from a fake source. Learn more about how malware is delivered and how to prevent malware attacks.

Top Security Threats Worldwide Q2 2024

Join WatchGuard CSO Corey Nachreiner and Director of Security Operations Marc Laliberte as they discuss key findings from the WatchGuard Threat Lab’s Q2 2024 Internet Security Report. You’ll learn about the latest malware trends, like malware volume dropping across all products but evasive “zero day” malware increasing. They’ll cover the top network exploits, like a 2019 Nginx vulnerability that threat actors targeted during the quarter. And they will share the most dangerous phishing and malware sites your users visited, and much more.

The Ultimate API Threat Report: How Wallarm Analyzes Attacks #Wallarm #dataanalysis

Discover how Wallarm gathers and analyzes real data on API attacks to create comprehensive security reports. By collecting data from Wallarm’s platform, public repositories, private sources, and security bulletins, Wallarm produces fact-based API threat stats without relying on opinions. This report provides deep insights into API vulnerabilities and attack trends, enhancing Wallarm’s API risk models and improving their security solutions. Download the full report now to stay informed on the latest API threats and protect your APIs effectively.