公式動画ピックアップ

AAPL   ADBE   ADSK   AIG   AMGN   AMZN   BABA   BAC   BL   BOX   C   CHGG   CLDR   COKE   COUP   CRM   CROX   DDOG   DELL   DIS   DOCU   DOMO   ESTC   F   FIVN   GILD   GRUB   GS   GSK   H   HD   HON   HPE   HSBC   IBM   INST   INTC   INTU   IRBT   JCOM   JNJ   JPM   LLY   LMT   M   MA   MCD   MDB   MGM   MMM   MSFT   MSI   NCR   NEM   NEWR   NFLX   NKE   NOW   NTNX   NVDA   NYT   OKTA   ORCL   PD   PG   PLAN   PS   RHT   RNG   SAP   SBUX   SHOP   SMAR   SPLK   SQ   TDOC   TEAM   TSLA   TWOU   TWTR   TXN   UA   UAL   UL   UTX   V   VEEV   VZ   WDAY   WFC   WK   WMT   WORK   YELP   ZEN   ZM   ZS   ZUO  

  公式動画&関連する動画 [Early Look: The Moment Hackers Talk Back]

This is an early preview of a conversation with Jeremy Brown. He shares his point of view on the difference between talking with a threat actor and actually negotiating with them, why experts advise opening that line of communication, and how those early exchanges can reveal critical forensic details about what data is at risk. He also walks through when negotiation begins, what victims try to achieve, and how attackers use those conversations to shape the ransom demand. Subscribe + Follow • Subscribe to Threat Vector https://www.paloaltonetworks.com/podcasts/threat-vector • Palo Alto Networks website http://www.paloaltonetworks.com/ • Unit 42 threat research https://unit42.paloaltonetworks.com/ • Facebook https://www.facebook.com/LifeatPaloAltoNetworks/ • LinkedIn https://www.linkedin.com/company/palo-alto-networks/ • More videos on YouTube @paloaltonetworks About Threat Vector Threat Vector is Palo Alto Networks podcast for people who want to understand what’s really happening in cybersecurity. Every episode brings you inside the latest threats, smarter protection strategies, and the trends shaping the field. You’ll hear from industry leaders, Palo Alto Networks experts, and real customers. The goal is simple. Give security teams and decision-makers the insights they need to stay ahead. About Palo Alto Networks Palo Alto Networks helps organizations prevent cyberattacks across cloud, network, and mobile with an automated, unified approach to security. Learn more at http://paloaltonetworks.com
 70      2