Countering Adversaries Part 3: Hacktivists and SQL Injection Attacks

Activists break into organizational web applications and databases to find personal and organizational data in order to expose this private information. The Verizon Data Breach investigations report says “Hacktivists generally act out of ideological motivations, but sometimes just for the fun and epic lutz.” In this third webcast of a three part series, (ISC)2 and Oracle will examine their number one tool of choice: SQL injection attacks. SQL injection attacks are both simple to perform and difficult to detect. We’ll discuss detecting and blocking SQL injection attacks in order to protect your most sensitive customer and organizational data from “epic lutz”.​
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Catch the Intruder in his Tracks - Advanced Threat Hunting

panda

The threat landscape has evolved significantly over the past twenty plus years, this webinar will highlight these changes and reveal how threats have advanced. The latest security paradigm for the endpoint detection and response will be brought to light and the implications for organisations debated.
Watch Now

Enhancing Cyber Security in Public Sector through Artificial Intelligence (AI)

Protect data confidentiality, personally identifiable information (PII), intellectual property, and industry information systems from the risk of data breach, damage and theft.
Watch Now

API-driven Revenue: The Developer Portal as your new sales executive

Discover the role of APIs in the digitalisation journey & how a developer portal can help you generate new business. How to win new customers through an API developer portal? Join this online event to explore the possibilities!
Watch Now

Importance of Virtual Labs in Cyber Security

Virtual environments have definitely changed the course of learning for Institutions and students alike. High-in-demand skills like cyber security can now be taught in virtual environments which are ethical and safe. Virtual environments are highly flexible and versatile, you can have access to the latest software programs required in ethical hacking without making any additional expenses.
Watch Now