EVERYTHING I LEARNED & WANTED TO FORGET ABOUT WAFS

Application security is nothing like it was 25 years ago. Today, almost all enterprise applications have some web-facing component, whether in the form of a pure web-app, cloud application, API, or microservice. Furthermore, attackers have become more efficient, persistent and sophisticated, while all along, web application security has failed to keep up. Web Application Firewalls (WAFs) have long been at the center of web application security strategy but have also created large gaps with their difficult-to-manage whitelist and signature approaches.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

A Modern & Secure Approach for Cyber Security Operation Centers

With 17,000 new cyber security threats discovered every week, finding a solution that improves flexibility, workflows, and the consolidation of data — while maintaining highly efficient monitoring and management capabilities is a must. This roundtable webinar brings Subject Matter Experts from Userful and Swimlane. The panel will discuss the importance of flexible solutions for Cyber Security Operations Centers, improvements for how your SOC manages and monitors critical security applications, and will recommend ways to improve the exchange of real-time data and collaboration between operators.
Watch Now

California Consumer Privacy Act: Are You Prepared for 2020?

InfoSec Institute

The California Consumer Privacy Act (CCPA), which gives residents more control over the use of their data and regulators increased powers to punish organizations, goes into effect on January 1, 2020. With California recently becoming the fifth largest economy in the world, the CPPA is expected to have wide-reaching impact.
Watch Now

Live Hack: Definitive Guide to Endpoint Security

When it comes to cyber security, one thing is clear: the most potent threat vectors into any organization are its endpoints. Your endpoints represent fertile ground for attacks because their users, applications, and services often have elevated privileges that give cyber criminals an easy on-ramp to the inner workings and data within your organization.
Watch Now

Practical Viewpoints: Global IT Security Compliance in 2022

Do you need to stay up to date regarding ever-evolving IT compliance mandates? Would you like to learn best practices for approaching IT security compliance? This virtual fireside chat will help you get on the right path.
Watch Now