Anatomy of an Attack

The online version of our live event series
focused on modern IT security threats



Virus attacks impact your network health like human viruses affect your body.
These resources will help keep you healthy or treat you if you become infected.

Events and more

Image

Our live events examine modern threats and offer tactics, tools and techniques to better defend your data and users.

We also offer informative podcasts. Download one or several and get educated.

Library

Image

Download these whitepapers and technical papers to get more info on threats and tips to fight them.

Threatsaurus
Don't let threats scare you. Here's everything you need in an easy-to-use A-Z threat glossary.

Money Behind the Malware
Understand the motivation of hackers and you can create an effective defense.

4 Threats in a Post-PC World
Best practices to manage BYOD, mobile security, cloud storage and social networks.

BYOD Risks and Rewards
We'll show you how you can adopt BYOD in your workplace while protecting your data.

ZeroAccess
This technical paper explores this threat's distribution mechanisms, installation procedure and more.

Blackhole Exploit Kit
This technical paper exposes how the kit works and components used to infect victim machines with malware.

Videos

Image

This video series will help you learn about and combat today's threats. We explore these topics:

Event highlight reel

Video

Our Anatomy of an Attack live events examine modern threats and offer tactics, tools and techniques to better defend your data and users.

Watch now