Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

QR Codes in a Post Pandemic World

On-Demand

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
On-Demand

QR codes were all but dead until smartphone companies started incorporating QR code scanners into their mobile phones back in 2017. Enter the COVID19 pandemic and the rise of the contactless economy, and the QR code is making a massive comeback. From advertising and restaurant menus to healthcare and agriculture – the use cases for QR codes are infinite.

QR Code Scanners: Beware

QR codes are accessible, easy to produce and seemingly, here to stay. They’re also a perfect way for cyber criminals to snag your employee’s personal information.

Join Len Noe, CyberArk White Hat/BioHacker in this live webinar as he shares his latest research on QR code attacks and the risks facing enterprises. Attendees of this session will walk away with

  • Examples of 3 simulated QR code attacks
  • Tactics, Techniques, and Procedures (TTPs) used by QR code attackers
  • Ways to protect yourself and your employees
  • Implications for enterprise security teams and controls to have in place to prevent privilege escalation and lateral movement within the IT estate

VIEW ON-DEMAND

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
ABOUT CYBERARK

CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.