Adlumin Insights: Threat Research
Presented by Adlumin Insights: Threat Research

Adlumin Insights: Threat Research

3 episodes
In this comprehensive series, our Threat Research Team and panel of cybersecurity experts will provide valuable insights into the world of threat detection
and threat hunting. We will explore the latest methodologies, tools, and techniques used to identify and respond to various types of threats, including
advanced persistent threats (APTs), malware, insider threats, and more. Throughout the webinar series, we will cover a wide range of topics, inclu

All episodes

Date
Threat Hunting that Protects Your Business from Cyber Risks

Threat Hunting that Protects Your Business from Cyber Risks

Mark Sangster, Vice President, Chief of Strategy, Adlumin and Kevin O’Connor, Director of Threat Research, Adlumin

Malware poses a significant threat to businesses across all industries. Cybercriminals operate like Fortune 500 companies, optimizing their operations with
superior technology and expertise, and increasing revenue in terms of ransoms and other illicit gains from their attacks. As criminals uplevel their abil

Watch

On-demand

Beauty Is in the Eye of the Deceiver

Beauty Is in the Eye of the Deceiver

Mark Sangster, Vice President, Chief of Strategy, Adlumin and Kevin O’Connor, Director of Threat Research, Adlumin

Deception Technology for Your Zero-Trust Arsenal Traditional security measures are no longer enough to keep up with the increase in sophisticated cyber
threats. Join Adlumin's experts as they discuss zero trust and complementing detection and response capabilities with deception technology. Deceptio

Watch

On-demand

Decoding PowerDrop Vulnerability: AI and ML in Adlumin's Threat Hunting

Decoding PowerDrop Vulnerability: AI and ML in Adlumin's Threat Hunting

Kevin O’Connor, Director of Threat Research at Adlumin

In the ever-evolving landscape of cybersecurity threats, organizations face the constant challenge of detecting and mitigating sophisticated attacks in a
timely manner. Implementing automation and machine learning into a threat hunting strategy is key, but what does that look like in practice? Join Ke

Watch

On-demand