Topic: Post Click Phishing Detection: The Solution to the Human Factor
Abstract: Unlike those that interact within the security realm day to day, the majority of users within the enterprise may be focusing on doing their job first and …[Read more]
Abstract: The FBI has reported Business Email Compromise (BEC) as being one of the most financially damaging online crimes and has cost organizations worldwide billions of dollars. Due to the persistence of these attacks, and …[Read more]
Title: Industrial Exploitation through Midpoint and Network Weaknesses
Description: Many industrial-targeting organizations, from ransomware gangs to state-directed intruders, have leveraged a series of critical vulnerabilities in network devices …[Read more]
Title: Cyber Digital Twins – Using AI to Predict Where Attackers Will Hit
Abstract:
The Cyber Digital Twin is configured to ingest different security contexts into a knowledge graph, analyzed with AI. At the macro level, it provides an …[Read more]