QR codes were all but dead until smartphone companies started incorporating QR code scanners into their mobile phones back in 2017. Enter the COVID19 pandemic and the rise of the contactless economy, and the QR code is making a massive comeback. From advertising and restaurant menus to healthcare and agriculture – the use cases for QR codes are infinite.
QR codes are accessible, easy to produce and seemingly, here to stay. They’re also a perfect way for cyber criminals to snag your employee’s personal information.
Join Len Noe, CyberArk White Hat/BioHacker in this on demand webinar as he shares his latest research on QR code attacks and the risks facing enterprises. Attendees of this session will walk away with
-Examples of 3 simulated QR code attacks
-Tactics, Techniques, and Procedures (TTPs) used by QR code attackers
-Ways to protect yourself and your employees
-Implications for enterprise security teams and controls to have in place to prevent privilege escalation and lateral movement within the IT estate
Recommended for You
Securing cloud access is critical. Join us to explore CyberArk’s T.E.A. (time, entitlements, approvals) and zero standing privileges to reduce cloud risks.
AI is shaping the evolution of DevSecOps and application security.
How the bubble model and resilient identity solutions can revolutionize identity management for your organization.
How to get a complete view of your exposure, control of your credentials when scanning, and automate your processes to reduce complexity.
Secure human and machine identities in the cloud without disrupting innovation. Learn from experts on visibility, risk analysis, and best practices.
Join us to learn key strategies for securing cloud environments, focusing on Zero Standing Privileges, native access, centralized management, and on-demand elevation.
Learn identity security defense strategies to protect patient data and ensure compliance in healthcare cybersecurity.
Attack methods are evolving FAST, understanding breaches and how to prevent them from happening is critical. Learn actionable steps in this webinar.
Analysis of significant breaches of the year and the methodologies employed by cyber adversaries.
To address certificate lifecycles, PKI and emerging machine identity challenges we are thrilled to announce the combined capabilities of Venafi, a CyberArk Company.
Join Microsoft, Device Authority, and CyberArk to explore integrated security solutions for the manufacturing industry, offering comprehensive protection and lifecycle security management.
Organizations still rely solely on MFA and fail to secure privilege at endpoints, widening the attack surface. Learn strategies for risk reduction.
Join CyberArk experts to learn five strategies to reduce your identity attack surface and close security gaps against modern threats.
CyberArk’s CIO shares his perspective on AI trends, threats, CyberArk’s approach to adoption and best practices for risk reduction.
Learn more about extending privileged access management to remote workforce, third parties, and external vendors.
Watch this SC Media and CyberArk webinar where leading experts provide essential guidance on navigating identity challenges and opportunities.
Watch to learn how CyberArk modernizes PAM programs for hybrid and multi-cloud environments.
Insights on the tools, techniques and methods for balancing organizational priorities and drivers with meaningful risk reduction.
Explore a detailed analysis of a medical cyberattack, revealing tools and tactics used by attackers, focusing on Qilin ransomware and security gaps.
Watch this SC Media and CyberArk webinar where leading experts provide essential guidance on navigating identity challenges and opportunities.