Bug Bounties and How They Help

Trend Micro

Once a vulnerability becomes known to cybercriminals, the race is on for vendors to create a patch before it is exploited. And with the regular use of exploits in attacks and threats like the WannaCry ransomware using a vulnerability, getting the win has never been so crucial. This month we will cover the bug bounty marketplace, including the different types of markets available to vulnerability researchers.  As well, we will review Trend Micro Research and how their research can benefit organizations through responsible disclosure and pre-disclosed filters to virtually patch vulnerabilities.
Watch Now

Spotlight

Never before has the need for collaborative data become more important, nor more vulnerable. APTs are becoming increasingly more advanced at jumping between systems. Meanwhile, today’s users are adept enough with computer systems to employ workarounds to traditional network separation requirements. These growing external and internal threats have an accumulative impact in creating and exploiting vulnerabilities. Correcting the aftereffects of this problem is a zero-sum game. To address the root of the problem, system architects must weigh information sharing capabilities against security controls between different network enclaves. This paper will explore the concept of cross-domain solution types by discussing their respective capabilities, common architectures, and critical considerations.

OTHER ON-DEMAND WEBINARS

Cyber Insurance: The Preparedness Roadmap

If you, like many others, are looking to purchase or renew a cyber insurance policy, this webinar will help you avoid unnecessary stress and be proactive with your cybersecurity controls.
Watch Now

Mitigating DDoS Attacks and Malware Spread

Modern malware, ransomware, and DDoS attacks have become a big issue for organizations of any size. Zero Trust strategies, in addition to application and DDoS protection, are a way to help deal with these issues. Most internet traffic is encrypted today, threat actors are using encryption to hide their attacks. Organizations must rely on TLS/SSL decryption and inspection to protect their users and networks. This is key to employing a strong Zero Trust strategy. We will explore these concepts in this research backed webinar.
Watch Now

That Was Close! Tales of Near-Miss Mobile Attacks

Zimperium

100% of Zimperium customers have detected mobile threats, and many of those customers previously believed they weren’t at risk. If you think your mobile devices are not being attacked, we are sorry to tell you that you are wrong. But don’t take our word for it, join us for tales of near-miss mobile attacks from real customers. They are near-misses only because Zimperium detected the attacks, but they could have been disastrous otherwise.
Watch Now

DEFEND, DETECT, AND REMEDIATE: A 360° VIEW OF CYBERSECURITY STRATEGIES

Secure-24

When it comes to securing information systems from breaches, the best medicine is a dose of prevention. In this complimentary webinar, panelists discuss top security threats and trends, business impacts, and the components of an effective, preventive cyber security program. The webinar addressed the following objectives: Evaluate top trends impacting information security. Describe how organizations can work smarter to enhance cybersecurity programs, despite resource and financial constraints. Evaluate effective cybersecurity measures and policies. Describe considerations and resources for educating employees.
Watch Now

Spotlight

Never before has the need for collaborative data become more important, nor more vulnerable. APTs are becoming increasingly more advanced at jumping between systems. Meanwhile, today’s users are adept enough with computer systems to employ workarounds to traditional network separation requirements. These growing external and internal threats have an accumulative impact in creating and exploiting vulnerabilities. Correcting the aftereffects of this problem is a zero-sum game. To address the root of the problem, system architects must weigh information sharing capabilities against security controls between different network enclaves. This paper will explore the concept of cross-domain solution types by discussing their respective capabilities, common architectures, and critical considerations.

resources