In this webinar, Dr. Scott Miserendino, VP of Research and Development at BluVector, will discuss three key areas where attackers are already using machine learning to bypass traditional cybersecurity detection and prevention defenses.
Learn More & Register >During this webinar, Josh Rosenthol, Integrations Manager at BluVector, discuss the different technologies that defined the solution and Jack Hamm, Senior Manager of SOC Operations at Gigamon, will demonstrate how the system works and discuss ways to expand this solution going forward.
Learn More >Learn how the Olympic Destroyer malware operated, and how the BluVector and Endace joint solution allows an analyst to quickly and effectively detect, respond and remediate this type of sophisticated attack.
Learn More >Over 50% of all malware includes fileless attack techniques. In this session, learn how BluVector can detect fileless malware on the network, helping organizations address these "invisible" or "memory-based" cyber-attacks in real-time.
Learn More & Register >In this webinar, learn what are the components of a next generation intrusion detection system, how intrusion detection is used in a modern layered network security environment and how to defending against the exfiltration of data once the attackers are in the network.
Learn More & Register >This webcast takes a look at the impacts of Meltdown and Spectre vulnerabilities.
Learn More >In the last two years, the number of breached data records has tripled over the total recorded since over the previous decade. Why have recent attacks been so successful, and what will security teams need to do to get a handle on them in the months ahead? Join 451 Information security research director Scott Crawford and Nate Carroll with BluVector to take a look at these questions.
Learn More >During this virtual workshop, attendees will hear how to leverage strategies and technologies to move away from the ‘detect and respond’ death-spiral towards a “predict and prevent” methodology.
Learn More >This on-demand webinar covers the various ways in which artificial intelligence (AI) and machine learning (ML) are coming to dominate the cyber security landscape.
This webinar provides you with an understanding of how the various types of machine learning techniques are being applied to cyber security and how those techniques are being tailored to solve particular problems in cyber security.
Learn More >Information security teams are increasingly concerned about the rapid growth of cyber threats. To address provide peer insights, Crowd Research Partners, in partnership with the 370,000+ member Information Security Community on LinkedIn, has conducted an in-depth study on several important threat lifecycle topics.
Learn More >