ESET has released its T1 2021 Threat Report, summarizing key statistics from ESET detection systems and highlighting notable examples of ESET’s cybersecurity research. The featured theme of the report recounts ESET’s analysis of a vulnerability chain that allows an attacker to take over any reachable Exchange server. The attack has become a global crisis, and this research identifies more than 10 different threat actors or groups that likely leveraged this vulnerability chain.
Join ISACA’s Information Security Professional Practices Lead, Jon Brandt, and ESET’s Chief Security Evangelist, Tony Anscombe, as they examine the findings of the ESET TI 2021 Threat Report. Dive deep into areas such as the rapid growth of “infostealers,” including the data they collect and how it is monetized; the increasing number of cryptocurrency threats; and recent vulnerabilities and potential exploitation of exchange servers and the resulting impact on organizations.
ISACA’s Digital Transformation Part II — People, Process, and Technology
ISACA’s Digital Transformation Part I —Positive Potential of Technology
Just the Fax on Cybersecurity
Supply Chain Security Considerations
The Relationship Between Privacy and Research
Pursuing Risk Resilience
The State of Cryptocurrency
Diversifying the Security Hiring Pool
Remote Access Tools From a Hacker Perspective
Risk After COVID-19: A New Workforce
The Perils of Overlooking Physical Security
Assessing the Ethical Implications of Information Technology
What Makes a Threat an APT?
Exploring the Push for Zero Trust
The Microcomputing Revolution
Strategies for Securing Remote Technology
Managing Malware Threats
The Evolution of Wi-Fi
Why You Need a Proactive Approach to Risk
Engineering an Effective Privacy Game Plan
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast