Security Trends Impacting Your Website

SiteLock

Please join SiteLock for our next webinar as we examine the latest cybersecurity trends and data from our 2019 Website Security Report. The report analyzes more than 6 million websites to determine the most prevalent cyberthreats websites face today, and provides unique insight into the top website risk factors and emerging trends for 2019.  Hosted by SiteLock Product Marketing Specialist, Monique Becent, the webinar will cover: Attack patterns, Risk factors, Vulnerabilities, Malware.
Watch Now

Spotlight

We show you the type of attack, or rather the type of vulnerability, the component, and how many times it occurred. Here, the alert, again, while it shows you things like the resolution and the references, the path that it existed in, the method in which this was invoked, there's some actual cool stuff that we show here on the right hand side. We collect things like the method. In this case, it was a post. The confidence level, the evidence, but we also show you the request and response. Here you can see what the request header was, the request body, the response header, as well as the response body. Now from a developer's perspective, if they wanted to replay this, we provide this really nifty command, or rather curl command. When you click this, you actually get a curl command with the actual post url, as well as all the header parameters that were passed to it to be able to simulate this on your local development environment. This makes it very easy for the developer to be able to see what's going on.

OTHER ON-DEMAND WEBINARS

Is GDPR Working? Lessons from Data & the Field

BitSight

Find out what data tells us about the effectiveness of GDPR. After years of debate over whether to impose new cybersecurity regulations on companies, the General Data Protection Regulation (GDPR) went into effect in Europe in May 2018. Already we’re seeing data breach victims ordered to pay fines under the new rules, and cookie disclosure notices are popping up on more websites than ever.
Watch Now

Focus on Open Source Compliance and Security During Legal TransactionsEnable Ginger

Data points to the fact that companies have difficulty managing third-party open source within their software code bases, leading to compliance, IP, and security risk. These risks are often amplified in legal transactions and can impact “go”/”no go” decisions if not addressed throughout the legal process. Join Leon Schwartz, Ass
Watch Now

Impact of Your Business Continuity Program on Cyber Resiliency

Business Continuity Awareness Week 2018 - Impact of your business continuity program on Cyber Resiliency. Every division inside IBM has a fully functional Business Continuity program focused on identifying what's critical to IBM's internal operations and making sure these business processes remain operational at time of disaster
Watch Now

MCAFEE + CISCO THREAT RESPONSE COLLABORATION & INTEGRATION

Dyntek

Today, organizations are faced with increasingly complex systems driven by McAfee + Cisco-Threat Response Webinar Blogdissolving enterprise boundaries, ubiquitous user data in the cloud and an increasing volume and sophistication of cyber attacks across multiple vectors. Siloed cyber security solutions only add complexity and restrict your ability to protect and respond to advanced attacks, while increasing costs and management overhead.
Watch Now

Spotlight

We show you the type of attack, or rather the type of vulnerability, the component, and how many times it occurred. Here, the alert, again, while it shows you things like the resolution and the references, the path that it existed in, the method in which this was invoked, there's some actual cool stuff that we show here on the right hand side. We collect things like the method. In this case, it was a post. The confidence level, the evidence, but we also show you the request and response. Here you can see what the request header was, the request body, the response header, as well as the response body. Now from a developer's perspective, if they wanted to replay this, we provide this really nifty command, or rather curl command. When you click this, you actually get a curl command with the actual post url, as well as all the header parameters that were passed to it to be able to simulate this on your local development environment. This makes it very easy for the developer to be able to see what's going on.

resources