top of page
Writer's pictureTony Fortunato

New SANS Webinar Reveals the Top Threats from 2020 and How to Stop Them

BREAKING NEWS!! Keysight Technologies has just completed the newest version of its annual security report. The findings will be revealed at a webinar hosted by the SANS Institute on April 27, 2021. You can register for the webinar using the following link:



This webinar will provide an overview of three key security trends that Keysight’s Application Threat Intelligence team uncovered during the year of 2020. In addition, their security experts will provide ways to mitigate and eliminate those threats. John Pescatore from SANS will also participate in the webinar and provide additional commentary on the Keysight findings.

Reserve your seat now so that you can get the latest security threat information to help protect your network.


In case you are not familiar with the Keysight ATI Research Center, it is formed from an elite group of dedicated network security professionals. The purpose of the group is to stay current with ever-evolving changes that could impact the security of IT networks. The team then distills that knowledge into research which can be incorporated within Keysight solutions to keep up with continually evolving threats. The ATI team is distributed across the world in locations like Singapore, California, Texas, Massachusetts, France, Romania and India so that there is always a part of the team that is looking for new threats to analyze. Cyber security is a specialty of the team.

The ATI team also contributes to the larger security community. It is not just about Keysight. The team shares what they learn with vendors that have been hacked, private agencies (e.g. www.mitre.org), government agencies (e.g. NIST and DARPA), and global security conferences like Black Hat and RSA. Keysight also promotes a summer security school in Bucharest, Romania to help train new security engineers.

The key goal for the ATI team is to assess and validate products that are meant to secure the enterprise. They do this by serving as a front line of defense to keep products from other vendors honest. Security alerts and incidents happen all over the globe and the team needs to be up around the clock. Dozens of engineers combine to form a single team that can create the intelligence and add to all product lines. In many cases, this lets the team go from discovery to product output within a twenty-four-hour period.

The exact input comes from many sources including:

· International exploit databases

· The “Dark Web”

· Scan of security news alerts and crowdsourcing

· Twitter handles of other security researchers

· Partner feeds

· Honeypots actively looking for attacks in the wild

Again, don’t forget to reserve a seat in the upcoming SANS webinar using this link.


41 views

Recent Posts

See All
bottom of page