Not All Flaws Are Created Equal: The Difference Between a Flaw, a Vulnerability and an Exploit

Veracode

According to Gartner, the application layer contains 90% of all vulnerabilities. However, do security experts and developers know what’s happening underneath the application layer? Organizations are aware they cannot afford to let potential system flaws or weaknesses in applications be exploited, but knowing the distinctions between these weaknesses can make all the difference in removing them successfully. During this webinar, Jim Jastrzebski of CA Veracode will discuss  how to identify risk factors within your application landscape and share his approach to helping security and development teams address them efficiently. Learn about the methods and solutions attackers typically rely on to perform application vulnerability discovery and compromise, and hear how organizations rely on application security technology and services to gain visibility into their overall landscape—and act upon it in the right way.
Watch Now

Spotlight

Moving to the cloud is more than a technical transition to a new platform. It is a core part of an enterprise's growth strategy and while strategically important, it can also be potentially disruptive.

OTHER ON-DEMAND WEBINARS

ATTACK SIMULATION

Cybereason

This isn't your typical product demo or attack simulation. In this webinar, we’ll take a closer look at how to empower you — the defender — with Ai Hunting technology. We'll start with the full view of a real-life cyber attack and then zoom in on the viewpoint of the defender. Witness the malicious operation from the defender’s view and learn how to gain the upper hand over the adversary with the power of automated threat hunting, using AI technology.
Watch Now

Top Ten Ways to Handle Contracts Effectively In-House

Handling a large number of contracts is a fact of life for most in-house attorneys – with an ever-increasing volume and tight deadlines, even before a M&A or other event triggers a voluminous contract review. But it doesn’t have to be chaotic or disorganized: with the right processes and tools you can provide strong, responsive
Watch Now

Web Application Security Essentials

We know it’s a challenge to stay on top of your web application security with new vulnerabilities being introduced all the time by untrained developers. So what can be done? The most efficient way to reduce the attack surface is to educate your entire team on recognizing potential web security issues to avoid introducing vulnerabilities in the first place.
Watch Now

Emerging Threats, Hackers and Attackers: Stories from the SOC

Alert Logic

Cyber attacks are ever-evolving and it can feel like you are struggling just to keep up. It’s time to get ahead of the game. Join us for the latest attack trends and threat insights from Alert Logic’s own SOC analysts. You’ll hear what’s happening on the front lines of cybersecurity defense, and which attack vectors are worth watching out for. We’ll also discuss the costs of running your own SOC and share some alternative approaches to get 24/7 dedicated coverage and better intelligence than you can access on your own.
Watch Now

Spotlight

Moving to the cloud is more than a technical transition to a new platform. It is a core part of an enterprise's growth strategy and while strategically important, it can also be potentially disruptive.

resources