Advanced Persistent Threats (APTs) unterscheiden sich von anderen Bedrohungen für die IT-Sicherheit sowohl hinsichtlich der Motivation als auch der Vorgehensweise von Angreifern. Seien Sie dabei, wenn unser Experte für Cybersicherheit, Fabian Freundt, die neuen APTs von heute unter die Lupe nimmt und Ihnen sagt, wie Sie diese lautlosen Bedrohungen mit den richtigen Tools erkennen können.

Les menaces évoluées persistantes (APT) diffèrent des autres menaces de sécurité informatiques, tant en termes de motivation que d’approche des agresseurs. Rejoignez Laurent Meimoun, expert en cybersécurité SonicWall, pour explorer les nouvelles APT actuelles et savoir comment bien utiliser les outils adéquats pour détecter ces menaces silencieuses.

Le minacce persistenti avanzate (Advanced Persistent Threats, APT) si differenziano da altre minacce alla sicurezza IT sia in termini di motivazione che di approccio da parte degli aggressori. Luca Pesce, esperto di cybersecurity di SonicWall, illustra le nuove minacce APT e spiega quali sono gli strumenti più efficaci per rilevare queste minacce silenziose.

Las Amenazas persistentes avanzadas (APTs) difieren de otras amenazas de seguridad de TI tanto en la motivación como en el enfoque de los atacantes. Escuche al Experto en Ciberseguridad de SonicWall Alex Vázquez hablar sobre las nuevas APTs de hoy en día y sobre cómo asegurarse de utilizar las herramientas adecuadas para detectar estas amenazas silenciosas.

Breaches are caused by a host of factors: compromised credentials, phishing, system glitches and more. But they all have a few things in common: They cost organizations more than $4 million on average, and they can all be mitigated, if not prevented entirely.

Join SonicWall Information Security Leader and PSIRT Operations Manager Immanuel Chavoya as he reveals the most common causes of data breaches — along with the factors that have the biggest impact on how much a breach will cost your organization, from red team testing and security skills shortages to employee training and remote work.

Known mostly for gaming, Discord has become a powerful gathering place for the hackers of tomorrow. Some of them are using your business as a proving grounds to hone their skills–whether for fun or for profit–and others are trying to stop them.

Which side will win? The one that we feed.

Join SonicWall Senior Strategist Brook Chelmo as he highlights why the next generation of hackers are more ambitious, better equipped and more effective than any that preceded them—and reveals what we can do to ensure they become allies, not adversaries.

In May 2021, CMIT Solutions of Metrolina was caught in a major ransomware attack against one of their customers. Initially it started with an infected email attachment, but with additional actions it lead to 4000+ attacks on 200+ endpoints and servers in multiple locations.

Join us to hear how CMIT Solutions successfully fought off an advanced attack through the use of security technology and their own individual actions. Listen to what they learned through the experience and what changes they made moving forward.

L’IoT non è una novità, ma lo sapevate che oggi è l’area di vulnerabilità che sta crescendo più rapidamente?
Nel 6° episodio della nostra serie MINDHUNTER, che si terrà il 20 ottobre, l’esperto di sicurezza Luca Pesce illustrerà le minacce e i semplici meccanismi che possono essere adottati per proteggere le organizzazioni. Non lasciate che l’IoT cresca in modo incontrollato!

Today’s cyber attackers can compromise your systems using a variety of methods, from well-disguised malware to sophisticated, targeted exploits aimed right at your company. How can you identify these attacks quickly and respond effectively? In this Dark Reading webinar, top experts discuss executive strategies and actionable methods your security operations team can use to detect different types of attacks and trigger a quick, effective response.
Hear from Joan Goodchild, Senior Editor, Dark Reading, John Sawyer, Associate Director of Services IOActive, Inc. and Dmitriy Ayrapetov, Vice President Platform Architecture, SonicWall — our panelists will discuss:
• Methods cyber attackers often use to compromise your systems
• Tips to recognize well-disguised malware used in targeted exploits
• Actionable advice on how to respond quickly and effectively to attacks
• Understand how your security operations team can use actionable insight and methods for a quick response

Vous connaissez l’IoT, mais saviez-vous qu’il s’agissait aujourd’hui du domaine de vulnérabilité qui connaît la plus forte croissance ?
Rejoignez Laurent Meimoun, expert en sécurité, dans l’épisode 6 de notre série MINDHUNTER, le 19 octobre, pour comprendre quelles sont les menaces et découvrir les mécanismes simples qui peuvent être mis en place pour protéger votre entreprise. Ne laissez pas l’IoT échapper à tout contrôle !