War of the Machines

Understanding the hacker advances in AI is critical to stop the new generation of cyber threats. At the same time, what techniques can we teach our AI’s to examine and prevent new exploitations.
Alex Holden | Jan. 17, 2018 | 64 min

Threats Examined – an Insider Look into the Latest Risks in Threat Landscape

Hold Security examines recent trends and breach categories to understand how the threat landscape has shifted.
Alex Holden | Nov. 14, 2017 | 57 min

Equifax Breach Examined

It is a terrible time for privacy in the United States. There are very few institutions that we entrust to hold nearly all our financial records and one of them, Equifax, admits to losing them. Let’s examine what we know about the breach and what are the long lasting effects will be.
Alex Holden | Sept. 15, 2017 | 62 min

World of Identity Management

As our digital footprint grows at home as well inside our organizations, how do you keep track of your ever expanding footprint? What’s the impact of you constantly sharing and bestowing your identity within devices and software? How do you defend it all and manage your identity in the age of a constant cyber breach?
Alex Holden | Aug. 15, 2017 | 59 min

Petya’s Real Impact in a New Era of Cyber Warfare

While understanding the current impact of Petya Ransomware is paramount, this type of global attack ushers a new era of cyber warfare. Besides direct impact and implications, we need to derive important lessons set by this attack. The next wave of attacks will be here shortly. Learn what can you do to prepare your enterprise for it.

Alex Holden | July 14, 2017 | 57 min

Malware in Disguise & How to Spot It

On the surface, spotting malicious attacks can be difficult. Hackers are expanding their malware distribution networks by exploiting commonly used applications to carry and distribute their malicious software. In the wake of the three major attacks Wanna Cry, DocuSign, and Google Docs malware outbreak we will examine how malware is distributed and provide guidelines on how to secure infrastructures against the next attack.

Alex Holden | May 24, 2017 | 56 min

Travel & Loyalty Reward Program Vulnerabilities

Join this webinar to learn the top 10 vulnerabilities within your travel and loyalty reward program abused by hackers. What do hackers see as an easy profit? Learn what to do to defend your customers’ benefits.

Alex Holden | May 11, 2017 | 42 min

WikiLeaks Vault7 Impact

Are we really surprised about the current revelations behind WikiLeaks Vault7? It confirms that the US government has secret hacking tools like everyone else. Are they the only ones who have these tools? We will discuss the Dark Web hackers and the government-sponsored hacking advances. Most importantly, how does it impact our privacy at home and within our companies. What do we need to do to stop this type of unwarranted exploitation?

Alex Holden | March 21, 2017 | 57 min

The State of Cybersecurity in 2017

Join us in discussing the state of cyber security in 2017. What are current threats, pitfalls, and the myths hindering our defenses. Learn advanced techniques of defending your enterprise security and making it an undesirable target.

Alex Holden | Feb. 23, 2017 | 59 min

Stolen Credentials – #1 Cyber Threat Today

Over the past several years Hold Security has seen hackers traffic 5 BILLION unique, unencrypted stolen credentials on the Dark Web. Hackers use some of these credentials to breach the most trusted systems and commit the most heinous cybercrimes. Join us to learn about the process of recovering stolen credentials from the hackers and alerting the victims.

Alex Holden | Feb. 7, 2017 | 60 min
3 4 5 6

Solutions Threat Intelligence Services Credential Integrity Service Domain Integrity Service Information Security Assessment Services Incident Response and Investigation
Call
1 (414) 678 1414
Mail
info@holdsecurity.com
Social
Our offices
Copyright © 2024 Hold Security