Reducing Application Risk: What Technology Can & Can’t Protect Against

Applications are the primary target of attack. Due to their prevalence and inherent exposure, and require a solid defense in depth strategy to reduce risk.  This webcast will educate IT and development teams on technologies available to build and deploy more secure software systems and debunks common myths about what each can and cannot protect. Topics include: Network vs. Application Security. Secure Communication Technologies:  Virtual Private Networks (VPNs), Firewalls and Intrusion Detection Systems (IDS). Hardening and Lockdown Tools:  integrity checkers, anti-virus, access control, vulnerability assessment, and run-time application self-protection (RASP). Shields Up: building stronger defenses.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

What is a Secure Software Development Framework?Enable Ginger

Application security is more than penetration testing. Organizations face a dilemma. Commercially, there is increasing pressure to shorten software release cycles, which in turn adds strain on software developers to produce faster release cycles. This in turn creates an environment where speedy release cycles take priority over
Watch Now

On Demand Utilizing Data to Eradicate Threats With Splunk & Zscaler

Modern zero trust requires the right architecture, analytics, dynamic policy, and risk visibility in order to reduce the attack surface, prevent lateral movement, and make real-time threat determinations with each transaction. Zscaler and Splunk tightly integrate best-of-breed cloud security and security analytics platforms to
Watch Now

CIO on Data Privacy and Securing Sensitive Information Shared in the Cloud

Bank information security

As organizations are relying more and more on cloud collaboration tools to store and share sensitive customer data, security concerns abound. Failure to comply with regulation is not a risk worth taking, and the financial cost, time lost and reputation damage from even one data breach can jeopardize an entire company. After all, it is the people behind the files and sensitive data that you need to protect.
Watch Now

Bug Bounties and How They Help

Trend Micro

Once a vulnerability becomes known to cybercriminals, the race is on for vendors to create a patch before it is exploited. And with the regular use of exploits in attacks and threats like the WannaCry ransomware using a vulnerability, getting the win has never been so crucial. This month we will cover the bug bounty marketplace, including the different types of markets available to vulnerability researchers. As well, we will review Trend Micro Research and how their research can benefit organizations through responsible disclosure and pre-disclosed filters to virtually patch vulnerabilities.
Watch Now