Search results
AI in Cybersecurity: Elevating DNS Security and Threat Detection

Join us for an insightful webinar that dives into the transformative role of Artificial Intelligence (AI) in modern cybersecurity. This session will explore how AI
can accelerate and enhance DNS-based threat detection capabilities through a real-world example of Domain Generated Algorithms (DGAs). You will learn
What a DGA is and its role in cyber threats How our innovative ML-based algorithm accelerates DGA detection The value of EfficientIP’s AI-driven DNS Sec…
Strengthen Your Defence-in-Depth Strategy with DNS

Unique security properties contained within the Doman Name System (DNS) protocol hold the key to elevating your security posture—continuously and
automatically. Please join us for Episode 3 of our Infoblox Insights Security Webinar Series, Strengthen Your Defence-in-Depth Strategy with DNS. Attend and
gain valuable knowhow, including: - The ways that malware uses DNS in attacks such as data exfiltration, DGAs, DDoS and others. - The emergence of Prot…
Model Assisted Threat Hunting Powered by PEAK & Splunk AI

Wanting to accelerate your threat hunting? Learn how Splunk AI can be the catalyst. Join us to learn how to leverage the PEAK threat hunting framework and
Splunk AI to find malware dictionary-DGA domains. We'll introduce the PEAK framework, walk through the hunt step-by-step, and demonstrate how to turn a
successful hunt into automated detection. Tune into this session on-demand to learn how PEAK and Splunk AI can help you: * Learn the basics of the PEAK …
How to Recognize Malicious DNS with Free Network Monitoring Tools

DNS is woven into the fabric of both the Internet and corporate intranets. It works so well that you might even forget it exists—until it is used against you.
Hackers are using DNS to find Command and control (C2) servers, control compromised systems, and exfiltrate your data. In this free training webinar, a
group of security experts from LogRhythm and Ultimate Windows Security team up to show you how to spot threatening DNS activity with LogRhythm NetM…
[APAC] Introducing MistNet NDR by LogRhythm: Network Threat Detection Made Easy.

If we reflect on the cybersecurity news of 2020, it is clear that determined threat actors are using carefully planned and sophisticated attack techniques to
breach the networks of target organisations. In any successful cyber intrusion, the threat actors successfully evaded the endpoint security systems, but the
network communications provides us with an opportunity for detection. In this on-demand webinar, you will learn three key network-based techniques that…
Protect Remote Workers, Cloud Apps and Data: IDC 2021 DNS Threat Report Findings

Elevate your network security decision-making when you register for our Roundtable Webinar! Top-tier organizations worldwide understand the importance
of embracing industry changes in 2021. To help you navigate the post-pandemic world, hear the trends reshaping DNS Security and how to ensure your
business is protected from data loss and downtime. Join moderator Kirk Appelman as he leads an open conversation with IDC analyst Romain Fouchereau …
Protect Remote Workers, Cloud Apps and Data: IDC 2021 DNS Threat Report Findings

Elevate your network security decision-making when you register for our Roundtable Webinar! Top-tier organizations worldwide understand the importance
of embracing industry changes in 2021. To help you navigate the post-pandemic world, hear the trends reshaping DNS Security and how to ensure your
business is protected from data loss and downtime. Join moderator Kirk Appelman as he leads an open conversation with IDC analyst Romain Fouchereau …
Introducing MistNet NDR by LogRhythm: Network Threat Detection Made Easy.

If we reflect on the cybersecurity news of 2020, it is clear that determined threat actors are using carefully planned and sophisticated attack techniques to
breach the networks of target organisations. In any successful cyber intrusion, the threat actors successfully evaded the endpoint security systems, but the
network communications provides us with an opportunity for detection. In this on-demand webinar, you will learn three key network-based techniques that…