Search results


AI in Cybersecurity: Elevating DNS Security and Threat Detection

AI in Cybersecurity: Elevating DNS Security and Threat Detection

Channel Logo
Yaelle Harel, Senior Product Marketing Manager

Join us for an insightful webinar that dives into the transformative role of Artificial Intelligence (AI) in modern cybersecurity. This session will explore how AI
can accelerate and enhance DNS-based threat detection capabilities through a real-world example of Domain Generated Algorithms (DGAs). You will learn
What a DGA is and its role in cyber threats How our innovative ML-based algorithm accelerates DGA detection The value of EfficientIP’s AI-driven DNS Sec…

Strengthen Your Defence-in-Depth Strategy with DNS

Strengthen Your Defence-in-Depth Strategy with DNS

Channel Logo
Infoblox

Unique security properties contained within the Doman Name System (DNS) protocol hold the key to elevating your security posture—continuously and
automatically. Please join us for Episode 3 of our Infoblox Insights Security Webinar Series, Strengthen Your Defence-in-Depth Strategy with DNS. Attend and
gain valuable knowhow, including: - The ways that malware uses DNS in attacks such as data exfiltration, DGAs, DDoS and others. - The emergence of Prot…

Model Assisted Threat Hunting Powered by PEAK & Splunk AI

Model Assisted Threat Hunting Powered by PEAK & Splunk AI

Channel Logo
Philipp Drieger, Ryan Fetterman and, David J. Bianco - Splunk

Wanting to accelerate your threat hunting? Learn how Splunk AI can be the catalyst. Join us to learn how to leverage the PEAK threat hunting framework and
Splunk AI to find malware dictionary-DGA domains. We'll introduce the PEAK framework, walk through the hunt step-by-step, and demonstrate how to turn a
successful hunt into automated detection. Tune into this session on-demand to learn how PEAK and Splunk AI can help you: * Learn the basics of the PEAK …

How to Recognize Malicious DNS with Free Network Monitoring Tools

How to Recognize Malicious DNS with Free Network Monitoring Tools

Channel Logo
Randy Franklin Smith (UWS), Rob McGovern (LogRhythm) and Erika Noerenberg

DNS is woven into the fabric of both the Internet and corporate intranets. It works so well that you might even forget it exists—until it is used against you.
Hackers are using DNS to find Command and control (C2) servers, control compromised systems, and exfiltrate your data. In this free training webinar, a
group of security experts from LogRhythm and Ultimate Windows Security team up to show you how to spot threatening DNS activity with LogRhythm NetM…

[APAC] Introducing MistNet NDR by LogRhythm: Network Threat Detection Made Easy.

[APAC] Introducing MistNet NDR by LogRhythm: Network Threat Detection Made Easy.

Channel Logo
Dan Crossley, Enterprise Sales Engineering Manager and John Golden, Enterprise Sales Manager, LogRhythm

If we reflect on the cybersecurity news of 2020, it is clear that determined threat actors are using carefully planned and sophisticated attack techniques to
breach the networks of target organisations. In any successful cyber intrusion, the threat actors successfully evaded the endpoint security systems, but the
network communications provides us with an opportunity for detection. In this on-demand webinar, you will learn three key network-based techniques that…

Protect Remote Workers, Cloud Apps and Data: IDC 2021 DNS Threat Report Findings

Protect Remote Workers, Cloud Apps and Data: IDC 2021 DNS Threat Report Findings

Channel Logo
Kirk Appelman (VP-N. America, EfficientIP), Alex Chauvin (Product Mgr, EfficientIP), Romain Fouchereau (Research Mgr, IDC)

Elevate your network security decision-making when you register for our Roundtable Webinar! Top-tier organizations worldwide understand the importance
of embracing industry changes in 2021. To help you navigate the post-pandemic world, hear the trends reshaping DNS Security and how to ensure your
business is protected from data loss and downtime. Join moderator Kirk Appelman as he leads an open conversation with IDC analyst Romain Fouchereau …

Protect Remote Workers, Cloud Apps and Data: IDC 2021 DNS Threat Report Findings

Protect Remote Workers, Cloud Apps and Data: IDC 2021 DNS Threat Report Findings

Channel Logo
Kirk Appelman (VP-N. America, EfficientIP), Alex Chauvin (Product Mgr, EfficientIP), Romain Fouchereau (Research Mgr, IDC)

Elevate your network security decision-making when you register for our Roundtable Webinar! Top-tier organizations worldwide understand the importance
of embracing industry changes in 2021. To help you navigate the post-pandemic world, hear the trends reshaping DNS Security and how to ensure your
business is protected from data loss and downtime. Join moderator Kirk Appelman as he leads an open conversation with IDC analyst Romain Fouchereau …

Introducing MistNet NDR by LogRhythm: Network Threat Detection Made Easy.

Introducing MistNet NDR by LogRhythm: Network Threat Detection Made Easy.

Channel Logo
Dan Crossley, Enterprise Sales Engineering Manager and John Golden, Enterprise Sales Manager, LogRhythm

If we reflect on the cybersecurity news of 2020, it is clear that determined threat actors are using carefully planned and sophisticated attack techniques to
breach the networks of target organisations. In any successful cyber intrusion, the threat actors successfully evaded the endpoint security systems, but the
network communications provides us with an opportunity for detection. In this on-demand webinar, you will learn three key network-based techniques that…