All About the Thousands of 2014 Vulnerabilities - From Secunia Research

"Every year, Secunia Research releases a review of the global vulnerability landscape, based on their large vulnerability database and data from the Secunia Personal Software Inspector (PSI) user base.

The data in this research provides security professionals around the world with perspective on the impact and evolution of the threat landscape and what has trended throughout the year.

In this webinar, Secunia’s Director of Research and Security Kasper Lindgaard will discuss the data presented in the Secunia Vulnerability Review 2015 and answer questions."
Watch Now

Spotlight

Cyberoam's exclusive Layer 8 technology which treats user identity as the 8th Layer or the human layer in the network protocol stack, enabling organizations to overcome the limitations of conventional UTMs/firewalls which bind security to IP addresses alone.


OTHER ON-DEMAND WEBINARS

Security in DevOps

"More organizations are embracing DevOps and automation to realize compelling business benefits, such as more frequent feature releases, increased application stability, and more productive resource utilization. However, many security and compliance monitoring tools have not kept up. In fact, they often represent the largest single remaining barrier to continuous delivery. Join Cliff Turner, Solutions Architect at Alert Logic along with Edward (Ed) Ray, Senior Security Architect at Rackspace and Ray Quinones, DevOps Solutions Engineer at Rackspace, as they discuss the principles of security as being part of the DevOps evolution. Topics discussed will include: - How DevOps principles can be extended to security - Overcoming challenges in DevOps environments - Best practices for blending DevOps with security "
Watch Now

“Cybersecurity: A Mid-Year Legal Review” Webinar

Cybersecurity is a top concern for GCs across industries. According to some estimates, as more corporate infrastructure moves online, the impact of data breaches will cost $2.1 trillion globally by 2019, almost four times the estimated cost of breaches in 2015.We invite you to join our attorneys (and fellow bloggers) Michael B. Hayes and David M. Brown and Capsicum Group’s Leeza Garber for a webinar June 25 on:Cyberattacks and why they are such a hot issue;How to guide your clients through a data breach;Landscape of existing federal and state laws you must consider in connection with cybersecurity and the potential impact of pending federal legislation on your cybersecurity and data breach notification responsibilities;Recent federal cybersecurity enforcement actions, penalties and trends (Federal Trade Commission and Federal Communications Commission);Class action case developments; and Looking forward – how you can mitigate your risks.
Watch Now

Webinar: Enterprise Cybersecurity: The Importance of Network Analysis

NH Learning Solutions

In essence, your network holds the key to defending your organization. In order for any business network to function properly and efficiently, it needs to be protected from possibly harmful traffic. Information and applications that are retrieved and transmitted over a network without protection can fall victim to a variety of attacks, such as phishing, Trojan horses, spyware, self-propagating worms, and more. While we're all faced with an often overwhelming challenge to secure all of our systems and processes from deliberate harm, new technologies, network intelligence, and improved ways of thinking about cybersecurity itself can give us a fighting chance.
Watch Now

How DNS-Based Attacks Operate from the Inside Out, and How to Defend Against Them

Infoblox

The Domain Name System (DNS) plays a critical role in modern network connectivity. Unfortunately, it is also a central part of many cyber-attacks as DNS is involved in more than 90% of malware/ransomware and nearly half of all data exfiltration incidents. So how exactly how do cyber-criminals use DNS to carry out attacks? In this webinar we will examine the many ways cybercriminals exploit the unique properties of DNS.
Watch Now

Spotlight

Cyberoam's exclusive Layer 8 technology which treats user identity as the 8th Layer or the human layer in the network protocol stack, enabling organizations to overcome the limitations of conventional UTMs/firewalls which bind security to IP addresses alone.

resources