Deploying Secure Modern Apps in Evolving Infrastructures

Security Boulevard

Software development is changing. It is now measured in days instead of months. Microservice architectures are preferred over monolithic centralized app architecture, and cloud is the preferred environment over hardware that must be owned and maintained. In this webinar, we examine how these new software development practices have changed web application security and review a new approach to protecting assets at the web application layer.
Watch Now

Spotlight

What Gartner calls "the new threat landscape" is more than just a clever metaphor, it describes a new era of cyber threats aimed at outmaneuvering any security solutions that get in their way. As today's highly publicized data breaches illustrate, the threats launched by these sophisticated cyber criminals seem to be paying off. In spite of this, the picture is not entirely bleak. New, innovative technologies are emerging that incorporate multiple security capabilities designed to increase your chances of keeping threats away from your network, and reducing data exfiltration, should advanced evasion techniques (AETs) allow a piece of malware to get past your gateway security.

OTHER ON-DEMAND WEBINARS

Security Analytics: How to Identify True Risks to Your Data

Imperva

The exponential growth of users, apps, and data has led to an increase in legitimate data access, complicating the task of determining whether data access is appropriate. Traditional security approaches tend to lock things down and limit data usage by deploying broad sets of security policies. Companies that take this approach, however, are still suffering from data breaches. In the meantime, security teams are often overwhelmed with a significant amount of alerts that don’t provide actionable insights.
Watch Now

Learn the Security and Privacy Best Practices to Manage the New California Privacy Regulations

IBM

Data security is moving to the top of the executive agenda, with companies paying more attention to what data they have, and how to protect it. Organizations are rolling out more access controls and upgrading their monitoring and assessment capabilities to best manage new regulations on the horizon. California’s passing of the California Consumer Privacy Act of 2018 (CaCPA) on June 28 and adoption of a set of amendments to the law in September has proven to be a strong catalyst for a new focus on data security.
Watch Now

Securing Organizations from Remote Desktop Protocol Exploits

HealthcareInfoSecurity

Insecure implementations of Remote Desktop Protocol have exposed organizations to serious risks of cyber attacks. Ransomware like SamSam and cryptominers like CrySis exploit insecure configurations, resulting in large and well-publicized breaches like the one that occurred at LabCorp. Because of the nature of Remote Desktop Protocol, these exposures often occur outside of organizations' known IP space, making them difficult to detect and remediate. This webinar will discuss how easily these misconfigurations can occur, how organizations can discover them, even outside of normal IP space, and how they can establish playbooks to remediate and reduce occurrence over time.
Watch Now

Must-Have Enterprise Mobile Security RFP Section: Advanced, Purpose-Built Threat Detection

Zimperium

Mobile operating systems (OSs) are fundamentally different from other endpoint OSs. Simply porting a security solution developed for a different platform over to mobile is inadequate and can leave your enterprise vulnerable. Effective enterprise mobile security requires a purpose-built solution that: Can protect mobile devices against known and unknown threats. Operates effectively even when an attacker controls the network.
Watch Now

Spotlight

What Gartner calls "the new threat landscape" is more than just a clever metaphor, it describes a new era of cyber threats aimed at outmaneuvering any security solutions that get in their way. As today's highly publicized data breaches illustrate, the threats launched by these sophisticated cyber criminals seem to be paying off. In spite of this, the picture is not entirely bleak. New, innovative technologies are emerging that incorporate multiple security capabilities designed to increase your chances of keeping threats away from your network, and reducing data exfiltration, should advanced evasion techniques (AETs) allow a piece of malware to get past your gateway security.

resources