Skip to content

Security

Categories

Sort

386 results found

Hacking Demo #2 Command & Control

This video portrays how malware uses command and control through the DNS protocol in order to contact the main server, to move onto their next act. In the previous video on phishing, one main infection...

Hacking Demo #1 Mail Infection

This demo video presents how mail infection can help malware enter the enterprise network. Once the user has opened the infected email attachment (e.g. an invoice, proposal, funny picture, resume), the malware installs itself and...

EfficientIP Solutions Overview

In this video, you will see how EfficientIP solutions can help to modernize your network with security, automation and IP address management. Follow Jane, IT network administrator, who faces standard issues like the introduction of...

Effective Zero Trust

In this video- originally aired November 2020 for the ISMG Cybersecurity Summit in India & SAARC- you will learn how to build an effective zero trust strategy for your network by enhancing application access control...