Intelligent API Cybersecurity, Is Your Agency Protected?

Carahsoft

As government agencies move towards digital transformation, Cyber threats are getting smarter, using social engineering, brute force methods, and even artificial intelligence (AI) to bypass common defenses to gain access to these critical systems and data. To help protect Federal Agencies against an ever-diversifying landscape of cybersecurity threats, Axway and Ping Identity have formed a global partnership to deliver a comprehensive Application program Interface (API) security solution that optimizes security at all levels, from network to application.
Watch Now

Spotlight

As a savvy IT director, you know it’s more challenging than ever to protect your enterprise against today’s evolving, sophisticated threats. And you are probably now looking at your security with a critical eye and the knowledge that traditional, signature-based antivirus by itself is a weak defense against the latest threats and targeted attacks.While many security vendors claim to have “the silver bullet” to solve all your security problems, the reality is that no single layer of security will protect against all the threats you face. You need a multi-layered security strategy, as outlined in Gartner Research’s “A Buyer’s Guide to Endpoint Protection Platforms”. However, there’s more to it than just having multiple layers of security. You need those layers to work together to provide an entire lifecycle of connected threat defense.

OTHER ON-DEMAND WEBINARS

Ponemon Survey Report: Measuring & Managing the Cyber Risks to Business Operations

Tenable

How does your experience compare with the findings from this Ponemon survey of 2410 infosec professionals? All information security professionals responsible for improving overall cybersecurity effectiveness are encouraged to attend this session.
Watch Now

Healthcare's Need for Shifting Security Priorities from Prevention to Detection

BankInfoSecurity

The digital revolution has given healthcare organizations new tools to increase team efficiency and improve their customer experience. But it's also opened up new vectors that cybercriminals can use to attack. As your attack surface expands to web infrastructure that you don't own or control, it becomes increasingly difficult to protect your digital assets and your data. You must shift security priorities from prevention to detection and remediation.
Watch Now

Protecting against Advanced Email Threats: Beyond the Nigerian Prince Scam

GreatHorn

In this webinar, GreatHorn CEO Kevin O’Brien discussed how phishing attacks have evolved – from the early days of the widespread Nigerian prince schemes to today’s sophisticated and highly targeted spear phishing threats – and how our collective response has failed to keep up. By reviewing common attack patterns, he highlights areas outside of technology that are critical to protecting organizations from advanced email threats – from business processes to user engagement
Watch Now

The Pesky Password Problem: How Hackers and Defenders Battle for Your Network Control

KnowBe4

What really makes a “strong” password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about your authentication methods? In this unique webinar you will learn about the recent NIST controversy and related password cracking problems. The “combatants” will be on the one side KnowBe4's Chief Hacking Officer, Kevin Mitnick with decades of first-hand “red-side” penetration testing experience, and on the other side Roger Grimes, KnowBe4's Data-Driven Defense Evangelist with decades of experience on the blue team.
Watch Now

Spotlight

As a savvy IT director, you know it’s more challenging than ever to protect your enterprise against today’s evolving, sophisticated threats. And you are probably now looking at your security with a critical eye and the knowledge that traditional, signature-based antivirus by itself is a weak defense against the latest threats and targeted attacks.While many security vendors claim to have “the silver bullet” to solve all your security problems, the reality is that no single layer of security will protect against all the threats you face. You need a multi-layered security strategy, as outlined in Gartner Research’s “A Buyer’s Guide to Endpoint Protection Platforms”. However, there’s more to it than just having multiple layers of security. You need those layers to work together to provide an entire lifecycle of connected threat defense.

resources