Trend Micro
Once a vulnerability becomes known to cybercriminals, the race is on for vendors to create a patch before it is exploited. And with the regular use of exploits in attacks and threats like the WannaCry ransomware using a vulnerability, getting the win has never been so crucial. This month we will cover the bug bounty marketplace, including the different types of markets available to vulnerability researchers. As well, we will review Trend Micro Research and how their research can benefit organizations through responsible disclosure and pre-disclosed filters to virtually patch vulnerabilities.
Watch Now
Cybercriminals are always on the lookout for opportunities to profit from security weaknesses. Meanwhile, the COVID pandemic lead accelerated cloud transformation has rendered many of the assumptions of legacy security approaches obsolete. Enterprises are realizing that modern cyber-attacks won’t be stopped by a purely preventive strategy. In fact, it’s almost a given that with sufficient time, motivation, and resources an attacker will always find a point of entry.
Watch Now
Trend Micro
Join Trend Micro’s Sr. Product Manager for Hybrid Cloud Security, Kyle Klassen, and Sr. Software Developer, Geoff Baskwill for our webinar: Security by Design—Full Life Cycle Container Security that Matches the Speed of DevOps. They will outline the key steps and tools that will help you artfully automate full life cycle container security, including useful APIs, image scanning and runtime protection to detect problems early and mitigate against attacks targeting your host, Docker®, and Kubernetes® platforms and containers.
Watch Now
Our Research Analyst, Satyajit Sinha will be speaking at the RoboBusiness Webinar on July 9th 2020 at 2 PM EST. The topic of the webinar is “Cybersecurity and Robotics Systems: Vulnerabilities and Solutions”.
One class of edge products, rarely mentioned in the typical IoT discussions and analyses, also provide for actuation. That is, they are robotic devices. Like other ‘connected’ IoT devices, robotics systems are open to security threats, which can be one roadblock to their widespread deployments. In this session, Counterpoint Research’s Satyajit Sinha will discuss current and future cyber security threats to networked robotics systems, highlighting their vulnerabilities in the process. He will also describe various cyber security solutions and provide a competitive landscape of security solutions for robotics systems.
Watch Now