<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

Author Archives:Lauren Wilson

Recent Posts

LIVE BrightTALK Webinar: Stop Watching & Start Blocking, Affordable Machine-Learning Enabled Defense

The chief problem with cyber security is that most of our tools and workforce is geared to waiting for adverse events, detecting those events (sometimes months after the fact), investigating the breach that has already occurred, and then cleaning up. This slow and reactive process ensures breaches happen and security staff us overwhelmed under the noise.

This talk will focus on automation and machine learning techniques that can proactively identify threats seen in the wild based on the latest academic research. This techniques allow organizations to identify suspect infrastructure before it is used to attack them. The key to making this work is infusing machine learning with knowledge of how actual attacks work and the threat landscape. Machine learning without intelligence is merely gussied up mensa math exercises.

Read More

Share this:

LIVE WEBCAST: The Basics to Understanding the Secret Life of DNS – Protecting Against Modern Threats at Scale

DNS is one of the single biggest important components to making the global internet work and it is often the most neglected aspects of a network. Invented in the 80's, DNS “just works," but its ease of use has people overlooking the power of using it to protect their customers. DNS offers the first clues to what is going on in your network and is used by criminals to steal data.

Read More

Share this:

Axim & ThreatSTOP Live Webcast: January 24. John Bambenek Talks Reducing Your Attack Surface with Threat Intelligence

Gathering and implementing threat intelligence is overwhelming, but it can be done in an extremely effective and uncomplicated way. John Bambenek, ThreatSTOP's VP of Security and Research, will talk about the threat landscape's new reality, where attackers are financially motivated pros, visibility into threats is limited and the attack surface has grown exponentially. (There have been 96M malware variants since 2016) With this, utilizing threat intelligence the right way (combined with modern packet capture) is essential to IT security and compliance.

Read More

Share this:

BrightTALK Webcast: December 13. John Bambenek Talks Predictions for 2019's Threat Landscape.

As part of BrightTALK's 2019 Trends and Predictions Webcast series, ThreatSTOP's VP of Security and Research, John Bambenek, is talking specifically about social engineering and phishing on this December 13th episode. Check out the details here:

Read More

Share this:

Searching for Cisco Umbrella Alternatives? Your Affordable Option for DNS Security with Advanced Reporting.

Looking for an affordable alternative to Cisco Umbrella Enterprise's high cost? ThreatSTOP comes with advanced reporting and security research tools out-of-the-box. See blocked threats, remediate client machines faster and check IOC’s. Here's a breakdown of how ThreatSTOP and Cisco line up.

Read More

Share this:

Need Affordable Cisco Umbrella Alternatives? This Chart Is Clutch.

Whether you're a company looking for an affordable alternative to Cisco Umbrella Enterprise's high cost, or looking for a solution with more features, better support & granular reporting, here's a breakdown of how ThreatSTOP and Cisco line up.

Read More

Share this:

John Bambenek Speaking at Infragard Symposium: A Primer on Cyber Security Intelligence & the Need For Threat Sharing

Read More

Share this:

Webcast with John Bambenek: Dangerous Lessons Learned from 2018's Healthcare Breaches

Read More

Share this:

BrightTALK Webcast: John Bambenek Talks Privacy & Security in IoT

This webcast is part of BrightTALK's Privacy Insights Series and National Cyber Security Awareness Month (NCSAM). Thursday, October 2nd, 9 AM PDT.

With the proliferation of the Internet of Things into every sphere of our lives, it's now more important than ever to understand the security and privacy risks associated with connected devices. With smart home devices, office tools, children's toys, even medical devices being vulnerable to cyber attacks, becoming cyber aware should be a key priority for everyone.


Read More

Share this:

ThreatSTOP Packs a Security Punch. Here's How in a Short Video. (Humor Included)

Read More

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter