Bug Bounties and How They Help

Trend Micro

Once a vulnerability becomes known to cybercriminals, the race is on for vendors to create a patch before it is exploited. And with the regular use of exploits in attacks and threats like the WannaCry ransomware using a vulnerability, getting the win has never been so crucial. This month we will cover the bug bounty marketplace, including the different types of markets available to vulnerability researchers.  As well, we will review Trend Micro Research and how their research can benefit organizations through responsible disclosure and pre-disclosed filters to virtually patch vulnerabilities.
Watch Now

Spotlight

While many businesses are looking further into adopting bring-your-own-device (BYOD) policies, other organizations are exploring an option that can provide the productivity benefits of BYOD without the complexity and headache associated with controlling personal devices: choose-your-own-device, or CYOD. Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD.


OTHER ON-DEMAND WEBINARS

"Internet of Things: The Time Is Now" "

"With the value of the Internet of Things (IoT) to hit $7 trillion by 2020, partners better not wait to beat their competition to this opportunity. In this short video, Channel Partners' Craig Galbraith breaks down what you need to know about security – a critical component of IoT – and steps you should take now to help customers who have already deployed IoT devices and services."

The Second Coming of Ransomware - Insights into New Developments

Cyber Management Alliance Ltd

We are excited to bring you an updated version of our hugely popular webinar, "Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next". Traditional ransomware, for the want of a better word, is boring and truthfully a fairly opportunistic way to make money.

Artificial Intelligence: Cyber Security Threat or Opportunity?

Infosecurity Magazine

The development of Artificial Intelligence and machine learning is creating excitement in the cybersecurity sector offering potentially huge benefits by supporting information security professionals and enabling the development of automated and intelligent technologies. However, the development of AI and intelligent technologies will also create new risks, threats and challenges around control and security.

"Office 365 Compliance and Data Protection: Cargill’s Blueprint for Success"

cargill

"Skyhigh’s Office 365 Cloud Adoption and Risk report shows that the average enterprise uploads 1.37TB of data across SharePoint, OneDrive, and Yammer each month, 17.4% of which is sensitive. With Office 365 use exploding and vast volumes of data headed to the cloud, IT Security teams are working to determine how they can enforce security, compliance, and governance policies seamlessly for O365. Cargill has been at the forefront of this movement, and in this webinar Matt Brunsvold, Infrastructure Security Architecture and Engineering Advisor at Cargill will share the findings of his research into Microsoft Office 365 controls and how they’re leveraging a Cloud Access Security Broker (CASB) to achieve comprehensive data protection."

Spotlight

While many businesses are looking further into adopting bring-your-own-device (BYOD) policies, other organizations are exploring an option that can provide the productivity benefits of BYOD without the complexity and headache associated with controlling personal devices: choose-your-own-device, or CYOD. Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD.

resources