API Security - Unlock the Secrets

The application programming interface (API) has become the basic building block of business allowing applications and software to talk and share data. APIs are the critical component for exchanging data between all types of entities. In this Webinar we'll break down how APIs are used and unlock the secrets to securing them. Highlights include: API Gateways are API Management tools not security; Providing audits & ensuring proper inspection on each transaction; Equipping every transaction for proper authentication and authorization.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Deploying Secure Modern Apps in Evolving Infrastructures

Security Boulevard

Software development is changing. It is now measured in days instead of months. Microservice architectures are preferred over monolithic centralized app architecture, and cloud is the preferred environment over hardware that must be owned and maintained. In this webinar, we examine how these new software development practices have changed web application security and review a new approach to protecting assets at the web application layer.
Watch Now

Understanding Cloud Security Benefits and Challenges

Vulnerabilities in the cloud are growing in number and severity, and risk leaders must learn how to respond. IBM reports that cloud vulnerabilities have increased 150% in the last five years. We are witnessing a global digital transformation, and cloud computing is the foundation and future of the digital world. It offers many benefits, but it’s crucial to understand what cloud security means and how to secure your data, applications, infrastructure, and workloads. In this free webinar, we get advice from Amazon and Google cloud security experts on how organizations can benefit from cloud security services and features and the challenges around people, processes and technologies when adopting the cloud.
Watch Now

On Demand Utilizing Data to Eradicate Threats With Splunk & Zscaler

Modern zero trust requires the right architecture, analytics, dynamic policy, and risk visibility in order to reduce the attack surface, prevent lateral movement, and make real-time threat determinations with each transaction. Zscaler and Splunk tightly integrate best-of-breed cloud security and security analytics platforms to
Watch Now

How Malware Affects Your Security Rating & What to Do About It

BitSight

Learn how botnet infections can impact your security posture. Security incidents such as malware infections can cause damage and disruption that propagates far beyond the organization, affecting its reputation, brand value and customer loyalty. Security ratings are impacted by these, giving an independent view into potential areas where security resources could be focused. In this webinar, BitSight's Tiago Pereira explains how and why botnet infections are a key metric of the effectiveness of your security posture, their impact on external security ratings and how to effectively deal with infections affecting your organization's rating.
Watch Now