How to Detect Cryptomining in your Environment



Cryptominers are built to turn computing power into revenue. To make cryptomining a profitable venture, cyber criminals are writing and distributing malware to steal computing resources to mine for cryptocurrencies like Bitcoin and Monero by attacking victims' endpoints, public cloud accounts, and websites. Through various attack vectors, cyber attackers can turn compromised systems into a silent zombie army of cryptocurrency miners. Unless you have advanced threat detection capabilities to detect crypto-mining activities on your endpoints, in the cloud and on premises, you might be unknowingly sharing your valuable computing resources with cryptomining criminals.

 

Join this webcast to learn:

  • The what, why and how of cryptomining
  • How cryptomining can evade traditional antivirus and other security controls
  • Best practices and essential tools for detecting cryptomining quickly
  • How AlienVault Unified Security Management (USM) can alert you immediately of cryptomining activity

Relevant Government Agencies

Intelligence Agencies, DOD & Military, Other Federal Agencies, Federal Government


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Wed, Jan 30, 2019, 2:00pm - 3:00pm


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Organizer
Informa
ITPro Today


Contact Event Organizer



Return to search results