{"id":3180,"date":"2018-05-03T16:13:36","date_gmt":"2018-05-03T23:13:36","guid":{"rendered":"https:\/\/zed.inguardians.com\/?p=3180"},"modified":"2019-08-01T16:20:21","modified_gmt":"2019-08-01T23:20:21","slug":"defending-from-crypto-jacking-ransomware-worming-malwares-frightening-future-part-of-the-brighttalk-webinar-series","status":"publish","type":"post","link":"https:\/\/zed.inguardians.com\/webinars\/defending-from-crypto-jacking-ransomware-worming-malwares-frightening-future-part-of-the-brighttalk-webinar-series\/","title":{"rendered":"Defending from Crypto-Jacking, Ransomware & Worming Malware’s Frightening Future (Part of the BrightTalk webinar series)"},"content":{"rendered":"
Both crypto-mining malware and ransomware, aside from gathering headlines, demonstrate that cybercriminals and nation-state actors are building capabilities for worming malware that could have the ability to do far greater damage than has yet been seen.<\/p>\n
Come to this talk, learn what\u2019s been going on, where it\u2019s likely going, and how to avoid being a victim of a headline-generating event.<\/p>\n
About the Speaker:
\nJay Beale created two tools used by hundreds of thousands of individuals, companies and governments, Bastille Linux and the Center for Internet Security\u2019s first Linux\/UNIX scoring tool. He has led training classes on Linux security at the Black Hat, CanSecWest, RSA, and IDG conferences, as well as in private corporate training, since 2000. As an author, series editor and speaker, Jay has contributed to nine books and two columns and given more than one hundred public talks. He led the development of the Linux security standard for the Center for Internet Security, served on the board of Mitre\u2019s OVAL project, and serves as a member on the O\u2019Reilly Security Conference\u2019s program committee.<\/span><\/div>\n
About this webinar In the last six months, crypto-mining malware and crypto-jacking have taken center stage in cybercrime news. We\u2019ll discuss the most recent events and see how this links to ransomware, which dominated the cybercrime news last year, where one outbreak cost seven companies over one billion dollars. Both crypto-mining malware and ransomware, aside […]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[57],"tags":[109,132,134,133,135,128,28,84,130,129,131],"_links":{"self":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/posts\/3180"}],"collection":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/comments?post=3180"}],"version-history":[{"count":1,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/posts\/3180\/revisions"}],"predecessor-version":[{"id":3181,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/posts\/3180\/revisions\/3181"}],"wp:attachment":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/media?parent=3180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/categories?post=3180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/tags?post=3180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}