Decentralized Security: Role of Blockchain in Cybersecurity
Date: June 24, 2024 Time: 3:30 PM CEST | 9:30 AM EDT | 7:00 PM IST Topic: Decentralized Security: Role of Blockchain in Cybersecurity Abstract: In an age where cyber threats are evolving rapidly, traditional security measures fall short of adequate mitigation capabilities. With digital technologies driving decentralization and related innovations, blockchain emerges as a […]
Deep Packet Inspection Analysis: Examining One Packet Killers
Date: June 20, 2024Time: 4:30 PM CEST | 10:30 AM EDT | 8:00 PM ISTTopic: Deep Packet Inspection Analysis: Examining One Packet Killers Abstract: Security Operations Center (SOC) teams monitor network traffic using SIEM and IPS solutions, along with other security tools. However, these tools can sometimes fall short in their capability, particularly when faced […]
Leveraging Threat Intelligence for Security: A Beginner’s Guide
Date: June 18, 2024 Time: 7:00 AM PDT | 10:00 AM EDT | 7:30 PM IST Topic: Leveraging Threat Intelligence for Security: A Beginner’s Guide Abstract: In the current threat landscape, threat intelligence is a crucial tool against evolving risks. Leveraging threat intelligence involves gathering security intelligence from various sources, including open-source feeds to commercial […]
The Human Element: Understanding Social Engineering Tactics
Date: May 28, 2024 Time: 10:00 AM EDT | 9:00 AM CDT | 7:30 PM IST Topic: The Human Element: Understanding Social Engineering Tactics Abstract: In today’s dynamic threat landscape, the one constant element persistently targeted is the human link, often because it is the weakest link in the security chain. Attackers constantly and relentlessly […]
Blockchain and Identity Management: Building Trust in a Digital World
Date: May 27, 2024 Time: 2:30 PM BST | 9:30 AM EDT | 7:00 PM IST Topic: Blockchain and Identity Management: Building Trust in a Digital World Abstract: In today’s interconnected digital landscape, ensuring security based on user behavior, identity, and access management has become significant. However, traditional identity management systems and networks are often […]