<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
    <channel>
        <itunes:owner>
            <itunes:name>Kaspersky</itunes:name>
            <itunes:email>severine.blechet@kaspersky.fr</itunes:email>
        </itunes:owner>
        <title>Kaspersky</title>
        <link>https://video.kaspersky.fr</link>
        <description></description>
        <language>fr-fr</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <itunes:author>Kaspersky</itunes:author>
        <itunes:type>episodic</itunes:type>
        <itunes:explicit>no</itunes:explicit>
        <itunes:image href="https://video.kaspersky.fr/files/rv1.4/sitelogo.gif"/>
        <image>
            <url>https://video.kaspersky.fr/files/rv1.4/sitelogo.gif</url>
            <title>Kaspersky</title>
            <link>https://video.kaspersky.fr</link>
        </image>
        <atom:link rel="self" href="https://video.kaspersky.fr/podcast/tag/Security"/>
        <atom:link rel="next" href="https://video.kaspersky.fr/podcast/tag/Security?tag=Security&amp;p=2&amp;podcast%5fp=t&amp;https="/>
        <item>
            <enclosure url="http://video.kaspersky.fr/64968577/90241643/4a8eadab4d708e73b0c6a63978fe6476/video_medium/kaspersky-container-security-video.mp4?source=podcast" type="video/mp4" length="8581100"/>
            <title>Kaspersky Container Security</title>
            <link>http://video.kaspersky.fr/kaspersky-container-security</link>
            <description>&lt;p&gt;La conteneurisation rend le développement d’application rapide et flexible, cependant elle attire non seulement les développeurs mais également les cybercriminels, et il est donc essentiel d’élaborer une stratégie de sécurité de ces environnements afin de se prémunir contre le risque d’attaques.&lt;/p&gt;
&lt;p&gt;Comment protéger efficacement les environnements conteneurisés ?&lt;br /&gt;
Existe-t-il une solution prenant en compte la structure spécifiques des conteneurs ?&lt;/p&gt;
&lt;p&gt;Découvrez-le ici en vidéo&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.kaspersky.fr/kaspersky-container-security"&gt;&lt;img src="http://video.kaspersky.fr/64968577/90241643/4a8eadab4d708e73b0c6a63978fe6476/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.kaspersky.fr/photo/90241643</guid>
            <pubDate>Fri, 03 Nov 2023 13:46:04 GMT</pubDate>
            <media:title>Kaspersky Container Security</media:title>
            <itunes:summary>La conteneurisation rend le développement d’application rapide et flexible, cependant elle attire non seulement les développeurs mais également les cybercriminels, et il est donc essentiel d’élaborer une stratégie de sécurité de ces environnements afin de se prémunir contre le risque d’attaques.
Comment protéger efficacement les environnements conteneurisés ?
Existe-t-il une solution prenant en compte la structure spécifiques des conteneurs ?
Découvrez-le ici en vidéo</itunes:summary>
            <itunes:subtitle>La conteneurisation rend le développement d’application rapide et flexible, cependant elle attire non seulement les développeurs mais également les cybercriminels, et il est donc essentiel d’élaborer une stratégie de sécurité de ces environnements...</itunes:subtitle>
            <itunes:author>Kaspersky</itunes:author>
            <itunes:duration>00:49</itunes:duration>
            <media:description type="html">&lt;p&gt;La conteneurisation rend le développement d’application rapide et flexible, cependant elle attire non seulement les développeurs mais également les cybercriminels, et il est donc essentiel d’élaborer une stratégie de sécurité de ces environnements afin de se prémunir contre le risque d’attaques.&lt;/p&gt;
&lt;p&gt;Comment protéger efficacement les environnements conteneurisés ?&lt;br /&gt;
Existe-t-il une solution prenant en compte la structure spécifiques des conteneurs ?&lt;/p&gt;
&lt;p&gt;Découvrez-le ici en vidéo&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.kaspersky.fr/kaspersky-container-security"&gt;&lt;img src="http://video.kaspersky.fr/64968577/90241643/4a8eadab4d708e73b0c6a63978fe6476/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.kaspersky.fr/v.ihtml/player.html?token=4a8eadab4d708e73b0c6a63978fe6476&amp;source=podcast&amp;photo%5fid=90241643" width="625" height="352" type="text/html" medium="video" duration="49" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.kaspersky.fr/64968577/90241643/4a8eadab4d708e73b0c6a63978fe6476/standard/download-7-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://video.kaspersky.fr/64968577/90241643/4a8eadab4d708e73b0c6a63978fe6476/standard/download-7-thumbnail.jpg/thumbnail.jpg"/>
            <category>container</category>
            <category>security</category>
        </item>
        <item>
            <enclosure url="http://video.kaspersky.fr/64968576/79396919/ca4c1620677cfd264bda99959a6ef5a8/video_medium/quest-ce-que-ledr-video-video.mp4?source=podcast" type="video/mp4" length="42020194"/>
            <title>Qu'est-ce que l'EDR - Vidéo CyberShare part.1</title>
            <link>http://video.kaspersky.fr/quest-ce-que-ledr-video</link>
            <description>&lt;p&gt;Les responsables de la sécurité et experts sécurité répondent à la question :&amp;nbsp;Qu'est-ce que l'EDR ?&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.kaspersky.fr/quest-ce-que-ledr-video"&gt;&lt;img src="http://video.kaspersky.fr/64968576/79396919/ca4c1620677cfd264bda99959a6ef5a8/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.kaspersky.fr/photo/79396919</guid>
            <pubDate>Fri, 07 Oct 2022 15:28:08 GMT</pubDate>
            <media:title>Qu'est-ce que l'EDR - Vidéo CyberShare part.1</media:title>
            <itunes:summary>Les responsables de la sécurité et experts sécurité répondent à la question :Qu'est-ce que l'EDR ?</itunes:summary>
            <itunes:subtitle>Les responsables de la sécurité et experts sécurité répondent à la question :Qu'est-ce que l'EDR ?</itunes:subtitle>
            <itunes:author>Kaspersky</itunes:author>
            <itunes:duration>07:14</itunes:duration>
            <media:description type="html">&lt;p&gt;Les responsables de la sécurité et experts sécurité répondent à la question :&amp;nbsp;Qu'est-ce que l'EDR ?&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.kaspersky.fr/quest-ce-que-ledr-video"&gt;&lt;img src="http://video.kaspersky.fr/64968576/79396919/ca4c1620677cfd264bda99959a6ef5a8/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.kaspersky.fr/v.ihtml/player.html?token=ca4c1620677cfd264bda99959a6ef5a8&amp;source=podcast&amp;photo%5fid=79396919" width="625" height="352" type="text/html" medium="video" duration="434" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.kaspersky.fr/64968576/79396919/ca4c1620677cfd264bda99959a6ef5a8/standard/download-5-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://video.kaspersky.fr/64968576/79396919/ca4c1620677cfd264bda99959a6ef5a8/standard/download-5-thumbnail.jpg/thumbnail.jpg"/>
            <category>EDR</category>
            <category>Reco</category>
            <category>sécurité informatique</category>
            <category>security</category>
        </item>
        <item>
            <enclosure url="http://video.kaspersky.fr/64968578/78290420/445918606f7c0e6c4e3dc42d9b6b4acb/video_medium/the-dark-side-of-potential-unwanted-video.mp4?source=podcast" type="video/mp4" length="73809743"/>
            <title>The dark side of Potential Unwanted Applications</title>
            <link>http://video.kaspersky.fr/the-dark-side-of-potential-unwanted</link>
            <description>&lt;p&gt;The prevalence of potentially unwanted applications (PUA) is much greater than of any type of malware. Every day at Kaspersky, we receive hundreds of thousands of notifications about users facing PUAs. PUAs are generally considered somewhat less sophisticated than other threats to IT security, so they’re not as well covered in the cybersecurity industry. While many antivirus vendors simply classify them as “unwanted” programs, PUAs are often the source of infection for serious threats.
&lt;p&gt;Our “PUA Botfarm” system, which downloads the current offers of several partner programs, helped us discover that almost half of Pay Per Install (PPI) partner program offers, which is a widespread way of distributing PUAs, also contain malware, such as cryptominers, password-stealers and banking Trojans.&lt;/p&gt;
&lt;p&gt;In this webinar, Anton Ivanov and Dmitry Latokhin, security experts on the Kaspersky Anti-Malware Research team, will share the results of our in-depth research of the most dangerous types of potentially unwanted applications.&lt;/p&gt;
&lt;p&gt;In this webcast you will learn:&lt;/p&gt;
&lt;p&gt;- How malware operators use PUAs to infect users&lt;br&gt;
- How PUA operators try to hide their illegal activities, e.g. most frequent ways to distribute PUAs&lt;br&gt;
- The principles of Kaspersky’s PUA Botfarm system, which uses PUAs to discover new threats and automatically detect them&lt;br&gt;
Basic rules to prevent infection with PUAs&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.kaspersky.fr/the-dark-side-of-potential-unwanted"&gt;&lt;img src="http://video.kaspersky.fr/64968578/78290420/445918606f7c0e6c4e3dc42d9b6b4acb/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.kaspersky.fr/photo/78290420</guid>
            <pubDate>Fri, 16 Sep 2022 13:59:28 GMT</pubDate>
            <media:title>The dark side of Potential Unwanted Applications</media:title>
            <itunes:summary>The prevalence of potentially unwanted applications (PUA) is much greater than of any type of malware. Every day at Kaspersky, we receive hundreds of thousands of notifications about users facing PUAs. PUAs are generally considered somewhat less sophisticated than other threats to IT security, so they’re not as well covered in the cybersecurity industry. While many antivirus vendors simply classify them as “unwanted” programs, PUAs are often the source of infection for serious threats.
Our “PUA Botfarm” system, which downloads the current offers of several partner programs, helped us discover that almost half of Pay Per Install (PPI) partner program offers, which is a widespread way of distributing PUAs, also contain malware, such as cryptominers, password-stealers and banking Trojans.
In this webinar, Anton Ivanov and Dmitry Latokhin, security experts on the Kaspersky Anti-Malware Research team, will share the results of our in-depth research of the most dangerous types of potentially unwanted applications.
In this webcast you will learn:
- How malware operators use PUAs to infect users
- How PUA operators try to hide their illegal activities, e.g. most frequent ways to distribute PUAs
- The principles of Kaspersky’s PUA Botfarm system, which uses PUAs to discover new threats and automatically detect them
Basic rules to prevent infection with PUAs</itunes:summary>
            <itunes:subtitle>The prevalence of potentially unwanted applications (PUA) is much greater than of any type of malware. Every day at Kaspersky, we receive hundreds of thousands of notifications about users facing PUAs. PUAs are generally considered somewhat less...</itunes:subtitle>
            <itunes:author>Kaspersky</itunes:author>
            <itunes:duration>37:41</itunes:duration>
            <media:description type="html">&lt;p&gt;The prevalence of potentially unwanted applications (PUA) is much greater than of any type of malware. Every day at Kaspersky, we receive hundreds of thousands of notifications about users facing PUAs. PUAs are generally considered somewhat less sophisticated than other threats to IT security, so they’re not as well covered in the cybersecurity industry. While many antivirus vendors simply classify them as “unwanted” programs, PUAs are often the source of infection for serious threats.
&lt;p&gt;Our “PUA Botfarm” system, which downloads the current offers of several partner programs, helped us discover that almost half of Pay Per Install (PPI) partner program offers, which is a widespread way of distributing PUAs, also contain malware, such as cryptominers, password-stealers and banking Trojans.&lt;/p&gt;
&lt;p&gt;In this webinar, Anton Ivanov and Dmitry Latokhin, security experts on the Kaspersky Anti-Malware Research team, will share the results of our in-depth research of the most dangerous types of potentially unwanted applications.&lt;/p&gt;
&lt;p&gt;In this webcast you will learn:&lt;/p&gt;
&lt;p&gt;- How malware operators use PUAs to infect users&lt;br&gt;
- How PUA operators try to hide their illegal activities, e.g. most frequent ways to distribute PUAs&lt;br&gt;
- The principles of Kaspersky’s PUA Botfarm system, which uses PUAs to discover new threats and automatically detect them&lt;br&gt;
Basic rules to prevent infection with PUAs&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.kaspersky.fr/the-dark-side-of-potential-unwanted"&gt;&lt;img src="http://video.kaspersky.fr/64968578/78290420/445918606f7c0e6c4e3dc42d9b6b4acb/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.kaspersky.fr/v.ihtml/player.html?token=445918606f7c0e6c4e3dc42d9b6b4acb&amp;source=podcast&amp;photo%5fid=78290420" width="625" height="352" type="text/html" medium="video" duration="2261" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.kaspersky.fr/64968578/78290420/445918606f7c0e6c4e3dc42d9b6b4acb/standard/download-11-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://video.kaspersky.fr/64968578/78290420/445918606f7c0e6c4e3dc42d9b6b4acb/standard/download-11-thumbnail.jpg/thumbnail.jpg"/>
            <category>application</category>
            <category>security</category>
            <category>webinar</category>
        </item>
        <item>
            <enclosure url="http://video.kaspersky.fr/64968580/77638035/bc1112e6f6bee96dc008177f242484ef/video_medium/the-power-of-threat-attribution-video.mp4?source=podcast" type="video/mp4" length="167864616"/>
            <title>The Power of Threat Attribution</title>
            <link>http://video.kaspersky.fr/the-power-of-threat-attribution</link>
            <description>&lt;p&gt;Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats is a massive undertaking.
&lt;p&gt;Vitaly Kamluk, Director of Global Research &amp;amp; Analysis Team, Kaspersky and Kirill Vorozhtsov, Solutions Architect, Kaspersky&lt;br&gt;
Attributing targeted attacks is a powerful and essential tool that:&lt;/p&gt;
&lt;p&gt;- Evaluates if you are a target or an unintended victim.&lt;br&gt;
- Provide insights into the actors behind the attack and their motivation.&lt;br&gt;
- Enables effective detection, investigation, containment and response based on the knowledge of the tactics, techniques and procedures specific to the threat actor&lt;/p&gt;
&lt;p&gt;Join our experts, Vitaly Kamluk and Kirill Vorozhtsov to learn how threat attribution can improve security operations and incident response, methodology and pitfalls of attributing threats. They will walk you through threat attribution examples with real-life APT malware samples and how it can be combined with other Threat Intelligence products to secure your business.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.kaspersky.fr/the-power-of-threat-attribution"&gt;&lt;img src="http://video.kaspersky.fr/64968580/77638035/bc1112e6f6bee96dc008177f242484ef/standard/download-83-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.kaspersky.fr/photo/77638035</guid>
            <pubDate>Fri, 02 Sep 2022 14:25:04 GMT</pubDate>
            <media:title>The Power of Threat Attribution</media:title>
            <itunes:summary>Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats is a massive undertaking.
Vitaly Kamluk, Director of Global Research  Analysis Team, Kaspersky and Kirill Vorozhtsov, Solutions Architect, Kaspersky
Attributing targeted attacks is a powerful and essential tool that:
- Evaluates if you are a target or an unintended victim.
- Provide insights into the actors behind the attack and their motivation.
- Enables effective detection, investigation, containment and response based on the knowledge of the tactics, techniques and procedures specific to the threat actor
Join our experts, Vitaly Kamluk and Kirill Vorozhtsov to learn how threat attribution can improve security operations and incident response, methodology and pitfalls of attributing threats. They will walk you through threat attribution examples with real-life APT malware samples and how it can be combined with other Threat Intelligence products to secure your business.</itunes:summary>
            <itunes:subtitle>Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats is a massive undertaking.
Vitaly Kamluk, Director of Global Research  Analysis Team, Kaspersky and Kirill Vorozhtsov, Solutions Architect, Kaspersky...</itunes:subtitle>
            <itunes:author>Kaspersky</itunes:author>
            <itunes:duration>01:13:27</itunes:duration>
            <media:description type="html">&lt;p&gt;Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats is a massive undertaking.
&lt;p&gt;Vitaly Kamluk, Director of Global Research &amp;amp; Analysis Team, Kaspersky and Kirill Vorozhtsov, Solutions Architect, Kaspersky&lt;br&gt;
Attributing targeted attacks is a powerful and essential tool that:&lt;/p&gt;
&lt;p&gt;- Evaluates if you are a target or an unintended victim.&lt;br&gt;
- Provide insights into the actors behind the attack and their motivation.&lt;br&gt;
- Enables effective detection, investigation, containment and response based on the knowledge of the tactics, techniques and procedures specific to the threat actor&lt;/p&gt;
&lt;p&gt;Join our experts, Vitaly Kamluk and Kirill Vorozhtsov to learn how threat attribution can improve security operations and incident response, methodology and pitfalls of attributing threats. They will walk you through threat attribution examples with real-life APT malware samples and how it can be combined with other Threat Intelligence products to secure your business.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.kaspersky.fr/the-power-of-threat-attribution"&gt;&lt;img src="http://video.kaspersky.fr/64968580/77638035/bc1112e6f6bee96dc008177f242484ef/standard/download-83-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.kaspersky.fr/v.ihtml/player.html?token=bc1112e6f6bee96dc008177f242484ef&amp;source=podcast&amp;photo%5fid=77638035" width="625" height="352" type="text/html" medium="video" duration="4407" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.kaspersky.fr/64968580/77638035/bc1112e6f6bee96dc008177f242484ef/standard/download-83-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://video.kaspersky.fr/64968580/77638035/bc1112e6f6bee96dc008177f242484ef/standard/download-83-thumbnail.jpg/thumbnail.jpg"/>
            <category>attribution</category>
            <category>security</category>
            <category>threat attribution</category>
            <category>webinar</category>
        </item>
        <item>
            <enclosure url="http://video.kaspersky.fr/64968558/76623108/a520b73acfa6acdf9d35ed31f0394122/video_medium/security-awareness-video.mp4?source=podcast" type="video/mp4" length="7679850"/>
            <title>Security Awareness</title>
            <link>http://video.kaspersky.fr/security-awareness</link>
            <description>&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.kaspersky.fr/security-awareness"&gt;&lt;img src="http://video.kaspersky.fr/64968558/76623108/a520b73acfa6acdf9d35ed31f0394122/standard/download-16-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.kaspersky.fr/photo/76623108</guid>
            <pubDate>Tue, 19 Jul 2022 16:35:05 GMT</pubDate>
            <media:title>Security Awareness</media:title>
            <itunes:summary></itunes:summary>
            <itunes:subtitle></itunes:subtitle>
            <itunes:author>Kaspersky</itunes:author>
            <itunes:duration>00:57</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.kaspersky.fr/security-awareness"&gt;&lt;img src="http://video.kaspersky.fr/64968558/76623108/a520b73acfa6acdf9d35ed31f0394122/standard/download-16-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.kaspersky.fr/v.ihtml/player.html?token=a520b73acfa6acdf9d35ed31f0394122&amp;source=podcast&amp;photo%5fid=76623108" width="625" height="352" type="text/html" medium="video" duration="57" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.kaspersky.fr/64968558/76623108/a520b73acfa6acdf9d35ed31f0394122/standard/download-16-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://video.kaspersky.fr/64968558/76623108/a520b73acfa6acdf9d35ed31f0394122/standard/download-16-thumbnail.jpg/thumbnail.jpg"/>
            <category>awareness</category>
            <category>Security</category>
        </item>
    </channel>
</rss>
