DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology CrowdCasts Monthly: Going Beyond the Indicator

1. Going Beyond the Indicator 2. Agenda • Introductions • Typical Attacker TTPs • Case Studies • New Tactics Explained • Hunting and Detecting • Best…

Software Tech ThrowDown:Invincea FreeSpace vs EMET 5.0

Solving Your Organizationâs #1 Business Problem Tech ThrowDown: Invincea FreeSpace vs EMET 5.0 Detection | Prevention | Intelligence October 31, 2014 Darrin Mourer, Cissp…

Software Tech Throwdown: Secure Containerization vs Whitelisting

Solving Your Organizationâs #1 Business Problem Presented By: Darrin Mourer Solution Architect Invincea Meet the Presenter Darrin is a Solution Architect with Invincea specializing…

Software Detection and Analysis of 0-Day Threats

1. Detection and Analysis of 0- day Threats STEVE TAYLOR, PRINCIPAL SOFTWARE ENGINEER 2. Meet the Presenter Steve Taylor Steve is a Principal Software Engineer at Invincea…

Technology An Approach to Closing the Gaps between Physical, Process Control, and Cybersecurity for the Energy....

1. 1 Bill Lawrence, Ph.D. Commercial Cyber Security Services, Lockheed Martin (C) Lockheed Martin Corporation 2014© Lockheed Martin Corporation. All Rights Reserved. This…

Software Webinar: Operation DeathClick: Uncovering Micro-Targeted Malvertising Against US Defense Industrial....

1. Uncovering Micro-TargetedMalvertising Against US DefenseIndustrial BaseWEBINAROCTOBER 16, 2014PATRICK BELCHER, DIRECTOR OF SECURITYANALYTICS, INVINCEA, INC. 2. Patrick…