Attack Surface Detector

NopSec

Penetration testers can only assess the attack surface they can see. Attack Surface Detector is a set of open source tools that can identify web application attack surface through static code analysis, making the data easy to leverage in dynamic testing. Penetration testers can also highlight differences in attack surface between two different versions of an application.
Watch Now

Spotlight

Cyber Security involves protecting key information and devices from cyber threats. It is a critical part of companies that collect and maintain huge databases of customer information, social platforms where personal information are submitted and government organizations where secret, political and defense information are involved. It describes how personal and key government data is protected against vulnerable attacks that possess threat to important information, may it be on the cloud, across various applications, networks and devices. Lot of money are invested in protecting all this information in an online platform. With the number of people accessing the information online increasing each day, threats to the information are also increasing, with the cost of online crimes estimated in billions.

OTHER ON-DEMAND WEBINARS

How to Leverage Hacking Competitions as an Educational and Recruitment Tool

HealthcareInfoSecurity

One of the most-heard complaints from security experts is that often they find their work repetitive ("The CFO's laptop has been compromised... again!"), which results in the desire of trying something "new", meaning "leave for another company." Another common complaint is that the work is very compartmentalized, and there are few occasions in which the various security specialists can enjoy working as a team. One activity that can help build a team while improving the security skills of the people involved is participating in Capture the Flag (CTF) hacking competitions. In 2003 at the University of California at Santa Barbara, one of the world's largest attack-defense CTF competitions began and has grown year-after-year, pushing the limits of the players and providing opportunities for better learning. In addition, hacking competitions are a great opportunity for recruiting new talent: CTF participants are highly skilled, well-motivated, and hard-working, which are great traits for a future employee.
Watch Now

3 Flaws with the Defense-in-Depth Security Model and How to Improve It

Infocyte

Reports of network intrusions have spiked in recent years resulting in millions in financial loses, theft of intellectual property, and exposure of customer information. The groups responsible for these attacks are organized and can persist in your organization’s systems and endpoints without detection for 6 months on average – sometimes years. The approach many organizations take to prevent these attacks is to simply layer on increasing numbers of defensive solutions – clearly a better approach is needed.
Watch Now

Adopting a Purpose-Built Approach to Linux Security

Carbon Black

Cloud is the dominant computing trend of our time, and Linux is the power behind it. As enterprises continue to adopt more cloud native infrastructure, we see accelerated adoption of Linux in the form of both migrations of existing infrastructure and greenfield application deployment. Unfortunately the approach to securing this growing fleet of production servers has not evolved at the same pace.
Watch Now

Leveraging Analytics for More Effective Security Performance

BitSight

More than ever before, companies are investing heavily in their organization's security. But as the threat landscape changes, how do you know that these investments in security are paying off — and how can you determine that you are investing the appropriate amount of security spending in the areas that matter most to your organization? Security ratings and the analytics they provide give businesses a unique insight into their organization's security performance and posture in relation to their peer group.
Watch Now

Spotlight

Cyber Security involves protecting key information and devices from cyber threats. It is a critical part of companies that collect and maintain huge databases of customer information, social platforms where personal information are submitted and government organizations where secret, political and defense information are involved. It describes how personal and key government data is protected against vulnerable attacks that possess threat to important information, may it be on the cloud, across various applications, networks and devices. Lot of money are invested in protecting all this information in an online platform. With the number of people accessing the information online increasing each day, threats to the information are also increasing, with the cost of online crimes estimated in billions.

resources