Detecting a Breach – Dark Web

Detecting a Breach – Dark Web

We try to fortify our perimeter against the hackers. The truth is that some of them get through, and in most dire cases, they take your data with them to the Dark Web. We will discuss detection of the breaches from the Dark Web perspective. What hackers do with your data, and how to tune your tools to detect your breached data outside of your perimeter.

Alex Holden | 09, 17 2018 | 60 min
HealthCare Data – Hacker Magnet

HealthCare Data – Hacker Magnet

What do hackers want to do with your medical data? These are practical examples from the Dark Web of real HealthCare data abuse. What is important to the bad guys, what is not? Learn about the hackers’ perspective and how to defend the data against abuses.
Alex Holden | 08, 15 2018 | 62 min
Breach Detection and Response Handbook

Breach Detection and Response Handbook

With GDPR present, getting breached not only carries losses due to hackers but the potential of penalties from the regulators and government. What is the best advice on how to deal with breaches, besides not getting breached? Let’s discuss the basics to show a measured standard for detecting malicious events, classifying them, and responding with at most efficiency.

Alex Holden | 06, 06 2018 | 61 min
Data Breach Price Tag

Data Breach Price Tag

Most breaches cannot be simply mitigated with technology or cyber insurance. Breaches have short-term and long-term price tags that come with loss of reputation with customers and stakeholders. We will discuss the true costs of breaches and what you can do to minimize the impact they cause.
Alex Holden | 04, 25 2018 | 63 min
Don’t Panic – Practical Guide to Dealing with Security Incidents

Don’t Panic – Practical Guide to Dealing with Security Incidents

If your organization has never been breached, think again, it probably happened and more than once. If you have dealt with a data breach before, you know how stressful and painful this can be. But let’s take a step back and examine: The basics for the incident response How to deal with the worst that the hackers can throw at you and still re-emerge successfully.
Alex Holden | 03, 22 2018 | 63 min
War of the Machines

War of the Machines

Understanding the hacker advances in AI is critical to stop the new generation of cyber threats. At the same time, what techniques can we teach our AI’s to examine and prevent new exploitations.
Alex Holden | 01, 17 2018 | 64 min
Threats Examined – an Insider Look into the Latest Risks in Threat Landscape

Threats Examined – an Insider Look into the Latest Risks in Threat Landscape

Hold Security examines recent trends and breach categories to understand how the threat landscape has shifted.
Alex Holden | 11, 14 2017 | 57 min
Equifax Breach Examined

Equifax Breach Examined

It is a terrible time for privacy in the United States. There are very few institutions that we entrust to hold nearly all our financial records and one of them, Equifax, admits to losing them. Let’s examine what we know about the breach and what are the long lasting effects will be.
Alex Holden | 09, 15 2017 | 62 min
World of Identity Management

World of Identity Management

As our digital footprint grows at home as well inside our organizations, how do you keep track of your ever expanding footprint? What’s the impact of you constantly sharing and bestowing your identity within devices and software? How do you defend it all and manage your identity in the age of a constant cyber breach?
Alex Holden | 08, 15 2017 | 59 min
Petya’s Real Impact in a New Era of Cyber Warfare

Petya’s Real Impact in a New Era of Cyber Warfare

While understanding the current impact of Petya Ransomware is paramount, this type of global attack ushers a new era of cyber warfare. Besides direct impact and implications, we need to derive important lessons set by this attack. The next wave of attacks will be here shortly. Learn what can you do to prepare your enterprise for it.

Alex Holden | 07, 14 2017 | 57 min
3 4 5 6

Logo
Řešení Threat Intelligence Services Credential Integrity Service Domain Integrity Service Služby posuzování informační bezpečnosti Reakce na incident a vyšetřování
Telefon
+420 770 121 812
Email
info@hstechnology.cz
Sociální sítě
twitter linkedin
Naše kanceláře
Autorská práva © 2024 Hold Security