Breaking the phishing line

WorkCast

It’s no surprise that phishing and business email compromises, commonly called CEO Fraud, continue to flourish.  Why? Because it is fast, easy, and despite security training, users still click on attacks. This 20/20 webcast looks beyond user training at how technology can address the challenges of modern phishing without reducing productivity or presenting users with potentially problematic emails.It’s no surprise that phishing and business email compromises, commonly called CEO Fraud, continue to flourish. Why? Because it is fast, easy, and despite security training, users still click on attacks.
Watch Now

Spotlight

Hackers are well aware of this oversight and are taking advantage of this blind spot which means that your organization needs to alter its network security strategy to avoid being the victim of a breach. This white paper will assist you in calculating the cost of leaving the SSL/TLS network security blind spot open to hackers and presents strategies to mitigate risks.


OTHER ON-DEMAND WEBINARS

Cyber-Defense: Are you Toast?

"Attackers continue to expose vulnerabilities at the world’s most recognized organizations. They are more skilled, more dedicated and supported by more resources than ever. While no one wants to be the “next one”, the key lies in understanding that privileged identities are at the heart of every highly-damaging breach. Please join Russell Miller, Director, Security Solutions and Steven McCullar, Advisor, Solution Strategy for CA Technologies to learn how protecting privileged identities can help bring the best security controls to the chokepoint of a potential attack. With the right controls in the right places, you can be well positioned to be in the headlines for only the right reasons"

Innovations in Network Security: Is your Intrusion Prevention Strategy Keeping Up?

IBM

Is your intrusion prevention strategy as robust as your peers and protecting you from unknown threats? Hear from the analyst firm Frost & Sullivan about the growing concerns over the increased number of advanced cyber-attacks, and what organizations within the Asia Pacific region are looking for in innovative security solutions to help protect themselves against these sophisticated attacks.Learn about the need for new security solutions with intrusion detection and prevention capabilities that help organizations move beyond legacy firewalls. And how organizations are adhering to more stringent security and regulatory compliance measures while protecting critical networks and sensitive data from external threats.Gain insight into IBM Security solutions that provide organizations with strong protection capabilities and advanced security features, while incorporating innovative options like a flexible licensing model to help meet requirements of organizations of all sizes.

API Security - Unlock the Secrets

Bank information security

The application programming interface (API) has become the basic building block of business allowing applications and software to talk and share data. APIs are the critical component for exchanging data between all types of entities. In this Webinar we'll break down how APIs are used and unlock the secrets to securing them. Highlights include: API Gateways are API Management tools not security; Providing audits & ensuring proper inspection on each transaction; Equipping every transaction for proper authentication and authorization.

Effective Cyber Security Monitoring and Incident Response

CREST

Jason will introduce some of the major challenges associated with monitoring and logging cyber security events, highlighting the need to identify indicators of compromise at a much earlier stage and in a more consistent, insightful manner.

Spotlight

Hackers are well aware of this oversight and are taking advantage of this blind spot which means that your organization needs to alter its network security strategy to avoid being the victim of a breach. This white paper will assist you in calculating the cost of leaving the SSL/TLS network security blind spot open to hackers and presents strategies to mitigate risks.

resources