Webinars

Upcoming Webinars

    customize-threat-detection-f

    May 24, 2018 @ 1:00PM

    Uncovering Advanced Persistent Threats

    In one of the largest ever sustained global cyber espionage campaigns known as Operation Cloud Hopper, a Chinese threat actor group dubbed APT10 was able to infiltrate managed IT service…...

    Read More
    webinar_BATH_part2

    May 29, 2018 @ 2:00PM

    Live Demo of Cb Response

    The average breach takes 150 days to discover - unless your team is proactively hunting threats, detecting attacks, and shutting them down. Join a live demo of Cb Response, Carbon…...

    Read More
    cryptomining

    May 29, 2018 @ 9:00AM

    Crypto Crime: Hunting for Cryptocurrency Mining in Your Enterprise

    2018 is shaping up to be an important year for not just Bitcoin, but the many new cryptocurrencies that seem to be popping up by the day. Attackers have discovered…...

    Read More
    CB_Defense_Dashboard_1814x1134_052317-PM

    May 30, 2018 @ 2:00PM

    Live Demo of Cb Defense

    Cb Defense is Carbon Black’s next-generation AV solution. Join us to learn why legacy antivirus—even with the advancement of artificial intelligence and machine learning—is no longer enough. Every Wednesday at…...

    Read More
    Carbon Black | It's Time to Replace Your Antivirus

    May 31, 2018 @ 1:00PM

    Why Companies are Switching to Cb Defense

    Traditional antivirus is no longer enough. It only stops known malware attacks -- but only 30% of attacks use malware. You need a Next-Generation AV solution to detect new unknown…...

    Read More
    hunting

    Jun 06, 2018 @ 6:00AM

    Security is a Big Data Problem: It Belongs in the Cloud

    It's hardly arguable that challenges to enterprise cyber security are ramping up. With WannaCry and Petya still recent memories, the incentive to find newer and better ways to tackle the…...

    Read More
    malware (1)

    Jun 12, 2018 @ 1:00PM

    How To Select And Evaluate Endpoint Security Products

    93% of organizations are targets of non-malware attacks. At the same time, cyberattackers are innovating faster than traditional defenses can keep up. No wonder 80% of security and IT professionals…...

    Read More
  • Industry
  • Use Case
  • Product
Sort by:
    Results
    0 Filters Applied
    • Clear Filters