Security by Design—Full Life Cycle Container Security that Matches the Speed of DevOps

Trend Micro

Join Trend Micro’s Sr. Product Manager for Hybrid Cloud Security, Kyle Klassen, and Sr. Software Developer, Geoff Baskwill for our webinar: Security by Design—Full Life Cycle Container Security that Matches the Speed of DevOps. They will outline the key steps and tools that will help you artfully automate full life cycle container security, including useful APIs, image scanning and runtime protection to detect problems early and mitigate against attacks targeting your host, Docker®, and Kubernetes® platforms and containers.
Watch Now

Spotlight

DDoS mitigation is paramount for businesses to protect against the growing threat of DDoS attacks. Learn about the ever increasing threat of DDoS attacks, the potential impact on businesses, and mitigation techniques to safeguard against them.

OTHER ON-DEMAND WEBINARS

Top Ten Ways to Handle Contracts Effectively In-House

Handling a large number of contracts is a fact of life for most in-house attorneys – with an ever-increasing volume and tight deadlines, even before a M&A or other event triggers a voluminous contract review. But it doesn’t have to be chaotic or disorganized: with the right processes and tools you can provide strong, responsive
Watch Now

Global Survey of Cybersecurity Leaders: Benchmarking Security Gaps & Privileged Access

Learn from your industry peers’ journeys to protecting privileged identities, stages of privilege access security, what they have achieved so far, and how to get the most value out of your cybersecurity investment. More than 2000 IT security leaders around the world shared their insights to create this research study. The broad reach of this study provides an opportunity to compare the PAM-related activities and attitudes of IT security practitioners with varying levels of responsibility, in different countries, industries, and companies of all sizes.
Watch Now

After the Data Breach: Stolen Credentials

Security Boulevard

When usernames and passwords are compromised in a data breach, the consequences extend far beyond the victim organization due to rampant password reuse. For this reason, NIST recently recommended that organizations check users’ credentials against a set of known compromised passwords. However, by patroning dark web forums and paying for spilled credentials, enterprises indirectly support the criminal ecosystem. Furthermore, attackers often don’t publicly post stolen data until months or years after the breach, if at all. Is there a better way to follow NIST guidelines and protect users from account takeover? Join Justin Richer, co-author of NIST Digital Identity Guidelines 800-63B, and Gautam Agarwal, Shape's Senior Director of Product Management, for a lively discussion on NIST’s password recommendations and how best to prevent account takeover fraud at your organization.
Watch Now

The Value of Diversity and Inclusion for Law Departments

The recent Thomson Reuters/Acritas 2019 State of the Corporate Law Department report found that gender-diverse teams achieved significantly higher performance ratings, mirroring earlier research on corporate boards and teams in general. Similar results have been shown for other categories of diversity. The facts are clear: diver
Watch Now

Spotlight

DDoS mitigation is paramount for businesses to protect against the growing threat of DDoS attacks. Learn about the ever increasing threat of DDoS attacks, the potential impact on businesses, and mitigation techniques to safeguard against them.

resources