Make 2015 More Secure: Lessons from 2014

"Will 2014 be remembered as the year of the mega-breach or will we all just try to forget the drumbeat of criminal hacks? In this webinar ESET Distinguished Researcher Aryeh Goretsky takes a positive approach and examines the lessons that can be learned from the year’s events in IT."
Watch Now

Spotlight

The information technology community has utilized container technology since the LXC project began in 2008 (Hildred, 2015). Containers are a form of virtualization that package application code and its dependencies together. Containers share the operating system kernel but maintain isolated processes. Until recently, it was not possible for the Windows operating system to share its kernel.


OTHER ON-DEMAND WEBINARS

"Comprehensive network security through actionable threat intelligence"

To protect their networks and critical data from being compromised, enterprises must be able to acquire and assess new information constantly, and take action to identify vulnerabilities, remediate and minimize the likelihood of attackers permeating through their network. HP TippingPoint Threat Protection System delivers comprehensive network security integrating vulnerability management to provide actionable threat intelligence with unparalleled visibility and analytics.
Watch Now

Productivity or Security: Do you have a Choice?

"Effective collaboration is essential to every business. But collaboration between employees, contractors, and suppliers can produce a range of information security risks, such as privacy breaches, data loss, and the loss of intellectual property. The growth of consumer-focused collaboration and information-sharing tools has brought productivity benefits to organisations. Their ease of use makes them popular with staff, but they are not built for the enterprise. Businesses need to make collaboration tools available that are not only easy to use, but also secure."
Watch Now

2014 – the Year of Data Encryption and Data Protection

"Data Encryption has been spoken about for years, but finally ENCRYPTION importance has come front-page. From the recent Snowden NSA Affair to major data breaches at Target, companies now have no choice but to consider securing their data at the source. This presentation will introduce you to your responsibilities in providing your customers with the Due Diligence (Risk Control and Executive Management Oversight) and Due Care (Continuous Monitoring through Security Practices, Procedures, Policies, Processes and Standards) that their personal data deserves."
Watch Now

On-Demand Webinar: The top ten automotive cybersecurity vulnerabilities of 2015

Rogue Wave

If you’re trying to build connected automotive software that’s both bulletproof and secure, you’ve got a big task ahead of you; knowing where to focus your time and energy can be half the challenge. Nearly 90% of all detected security holes can be traced back to just ten types of vulnerabilities. Join us to review these vulnerabilities and see how they are discovered in real software, what those problems might look like in your code, and what simple changes you can make to your coding style or processes to avoid them.
Watch Now

Spotlight

The information technology community has utilized container technology since the LXC project began in 2008 (Hildred, 2015). Containers are a form of virtualization that package application code and its dependencies together. Containers share the operating system kernel but maintain isolated processes. Until recently, it was not possible for the Windows operating system to share its kernel.

resources