Getting Started with Application Security

Veracode

Application-layer attacks are growing much more rapidly than infrastructure attacks, yet many organisations remain hesitant to create an application security programme as they believe it will require excessive time and resources.Join our webinar to discover how any organisation, regardless of size or resources, can create an effective application security programme.
Watch Now

Spotlight

"Year after year, cyber threats continue to increase in both sophistication and frequency. Many of the attacks involve compromised user names and passwords. In an environment where identity theft, data breaches and fraud are increasing, as anywhere, anytime access for employees, partners and customers is also increasing, a comprehensive solution of strong and risk-based authentication is important to every organization's security strategy."


OTHER ON-DEMAND WEBINARS

Password changing in IBM Security Secret Server

IBM

In this session, experts from Technical Support will discuss the purpose of the Remote Password Changing feature in Secret Server, as well as how to enable and configure Remote Password Changing, along with a live demonstration.

Evaluating Security Risks Associated with Banking Vendors

bankinfosecurity

Regulatory change is coming - fueled by the ever present news of breaches within the credit card payment networks degrading the faith in today's financial institutions. PCI-DSS is a step in the right direction toward thwarting 'smash and grab' attacks but is weak against zero day attacks and low 'n slow attacks that are designed to persist under the radar of common controls. A new approach is needed to secure, make compliance easier, and enhance the operating efficiency for critical financial data centers and those processing sensitive cardholder information or personally identifiable information (PII).

Phishing 101: Don't Take The Bait

NopSec

Learn how to spot the signs of an attack. Get to know the various types of phishing campaigns. Understand who is being targeted & why.

"The Future of Monitoring"

hp

Enterprises are accelerating transformations towards Digital Business and they are grappling with bi-modal IT requirements to support fast-paced innovation for their systems of differentiation while maintaining stable systems of record. Discuss these market disruptions and related trends, including Cloud and DevOps, and how they affect monitoring strategies now and into the future. Also, it will cover HP's BSM vision and roadmap for the future to address this new world

Spotlight

"Year after year, cyber threats continue to increase in both sophistication and frequency. Many of the attacks involve compromised user names and passwords. In an environment where identity theft, data breaches and fraud are increasing, as anywhere, anytime access for employees, partners and customers is also increasing, a comprehensive solution of strong and risk-based authentication is important to every organization's security strategy."

resources