Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Deep Instinct


Latest Content From Deep Instinct

Webcast: Implementing an Effective Defense Against Ransomware

by Deep InstinctSep 16, 2020

Ransomware has become one of the fastest-growing cyber threats faced by enterprises today, not to mention municipal governments, hospitals and schools. What are the most common ways that ransomware gets into systems, and how can you limit the possibility of infection? If you are infected, what steps should you take to mitigate the problem, and how should you deal with the perpetrators? This webinar will answer these questions and many more, providing  expert advice on how to stop ransomware from infecting your critical systems and data --and what to do if your defenses fail.


Webcast: How Cyber Attackers Will Use & Abuse AI, ML Against the Enterprise

by Deep InstinctJul 15, 2020

Machine learning (ML), deep learning (DL), and artificial intelligence (AI) are powerful new technologies in the hands of cyber defenders….and in the hands of cyber attackers, as well. What could AI-powered cyber attacks look like? How can enterprises begin to defend themselves against threats like that? In this webinar, get a picture of the actual threat landscape today, realistic predictions of how it will evolve, and what businesses can do now to prepare for the future.


Webcast: Building and Managing an Effective Mobile Security Strategy

by Deep InstinctMay 06, 2020

Most organizations today allow employees and other users to bring their own mobile devices onto the enterprise network to access corporate data. But in many cases, security teams still do not have comprehensive, enforceable security policies that take into account the many technologies and networks that users may employ to connect their mobile devices.


Webcast: Cyber Attack Evasion Techniques

by Deep InstinctMar 23, 2020

When it comes to evasion techniques there’s a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, they hide their malicious indicators and behaviors from detection tools and automated threat analysis systems.


Webcast: Implementing an Effective Defense Against Ransomware

by Deep InstinctNov 05, 2019

Ransomware has become one of the fastest-growing cyber threats faced by enterprises today, not to mention municipal governments, hospitals and schools. What are the most common ways that ransomware gets into systems, and how can you limit the possibility of infection? If you are infected, what steps should you take to mitigate the problem, and how should you deal with the perpetrators? This webinar will answer these questions and more, providing expert advice on how to stop ransomware from infecting your critical systems and data --and what to do if your defenses fail.