How to Achieve Best Practice in Application Security in 2017

Veracode

Attacks via SQL Injection, mobile apps failing to provide proper protection and more data moving to the cloud, are trends that have been more prevalent in 2016 than ever before. How much of your business is based on a realistic application security programme?This webinar will explore how to build an application security model and consider how applications will shape the world of security in 2017.
Watch Now

Spotlight

Organizations once needed only a single on-premises security stack that protected endpoints in a single office. Those days are long gone. The new normal for the Cloud Generation is a threat landscape shaped by complex factors and demands: Data, devices, applications are no longer confined to the traditional perimeter.


OTHER ON-DEMAND WEBINARS

WEBINAR: THE HUMAN FIREWALL – STRENGTHENING EMAIL SECURITY

Mimecast

The numbers are alarming - 91% of hacks begin with an email attack and 23% of phishing emails are opened. Employees, the humans, have always been the weakest link in an IT security strategy. Attackers know this, and prey on them with spear-phishing and social engineering attacks. Why your existing IT security strategy is failing. How to strengthen security with better employee threat awareness.
Watch Now

"Today’s UTM: Expect More Than a Multi-Function Appliance"

Fortinet

"With a recent survey reminding us that the most critical priorities of SMB owners today are top line revenue growth and increase in bottom line profitability, with an overwhelming desire for trusted IT/Security partners to manage the entirety of security and IT for them, it makes perfect sense to demand more of today’s UTM. In this webcast we will explore: •The results of the recent SMB owner survey •Ways the simplicity of the traditional UTM can be extended more broadly •Key questions to ask your trusted IT/Security provider"
Watch Now

Security Incident Investigations: What am I looking at here?

"So, you've got an alarm - or 400 alarms maybe, now what? Security incident investigations can take many paths leading to incident response, a false positive or something else entirely. Join this webcast to see security experts from AlienVault and Castra Consulting work on real security events (well, real at one point), and perform real investigations, using AlienVault USM as the investigative tool. Process or art form? Yes. You'll learn: - Tips for assessing context for the investigation - How to spend your time doing the right things - How to classify alarms, rule out false positives and improve tuning - The value of documentation for effective incident response and security controls - How to speed security incident investigation and response with AlienVault USM Presenters: Joe, Tony and Grant, collectively known as ""JTaG"", have been working with packets one way or another for a combined 50 years. During their tenure at AT&T, they managed IDS for some of the world's largest companies and have used every IDS available from NetRanger to Suricata. They also stood up SIEMs capable of processing billions of events per day in their ""Threat Management"" SOC environment. These days, they use their powers for good, helping customers of all sizes understand the ever-changing security landscape."
Watch Now

"Remove Risk When Adopting Cloud Applications"

netskope

"Join Netskope to learn how to measure cloud risk and apply policy enforcement in your organisation. Netskope provide surgical visibility and control of all sanctioned and unsanctioned cloud apps, ensuring that you have 360 coverage and can reduce the risk of moving your business to the cloud."
Watch Now

Spotlight

Organizations once needed only a single on-premises security stack that protected endpoints in a single office. Those days are long gone. The new normal for the Cloud Generation is a threat landscape shaped by complex factors and demands: Data, devices, applications are no longer confined to the traditional perimeter.

resources