API Security - Unlock the Secrets

Bank information security

The application programming interface (API) has become the basic building block of business allowing applications and software to talk and share data. APIs are the critical component for exchanging data between all types of entities. In this Webinar we'll break down how APIs are used and unlock the secrets to securing them. Highlights include: API Gateways are API Management tools not security; Providing audits & ensuring proper inspection on each transaction; Equipping every transaction for proper authentication and authorization.
Watch Now

Spotlight

This series of video lectures presents network security architecture concepts. These will help you better understand the role and function of access control devices such as firewalls and routers and proper network security design.

OTHER ON-DEMAND WEBINARS

Learn the Ins and Outs of a Security-Aware Culture from a Forrester Expert

MediaPRO

Developing and maintaining a security-aware culture in an organization has become vital in the defense against modern cyberthreats. But such a culture cannot be expected to develop overnight. Building such a culture is a journey, not a miracle, with many pitfalls along the way. That’s why we’re here to help. Watch our on-webinar Harden the Human Firewall by Building Awareness, Behavior, and Culture, with MediaPRO Chief Learning Officer Tom Pendergast guest speaker Forrester analyst Jinan Budge to learn how to instill a culture of security through an engaging, meaningful, and even entertaining security awareness program.
Watch Now

The Business Impact of Cyber Risk

InfoSec Institute

KPMG reports 68% of CEOs believe a cyberattack is a matter of when — not if. How is your organization preparing to mitigate cyber risk in the new year? Join David Kruse, technology risk consultant, Justin Webb, CIPP-certified attorney and Jeff McCollum, crisis response and public relations professional for strategies to help you: Discuss cybersecurity at the board level.
Watch Now

2022 Critical Cybersecurity Technologies

The explosion of edges created by digital acceleration places an enormous strain on any cybersecurity infrastructure. Simply put, security has to be everywhere and traditional security approaches cannot handle today’s challenges.
Watch Now

Another Bucket Bites the Dust... Simplifying AWS Cybersecurity

Alert Logic

With the rapid rise of web application attacks, which is the number one source of data breaches, securing cloud-based web applications is a challenge. In order to fully protect your web applications in the cloud, it is important to know the risks, select the right security tool, and understand your role in the shared responsibility for security. Securing your AWS workload can mean many different things, ranging from locking down your environment via the AWS best practices list, to completely outsourcing the security management and responsibility to another company. While every company’s security journey is different, everyone can agree that the need to monitor and improve security posture is becoming increasingly important.
Watch Now

Spotlight

This series of video lectures presents network security architecture concepts. These will help you better understand the role and function of access control devices such as firewalls and routers and proper network security design.

resources