The Fine Line: 2016 Trend Micro Security Predictions

Although we shall witness many strides in cybersecurity in 2016, there will still be a narrow margin between these and the threats we’re foreseeing. Advancements in existing technologies—both for crimeware and for everyday use—will bring forth new attack scenarios. It’s best for the security industry as well as the public, to be forewarned to avoid future abuse or any monetary or even lethal consequences.
Watch Now

Spotlight

This white paper discusses why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.


OTHER ON-DEMAND WEBINARS

Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball

"If you made it through 2014 without suffering a significant breach, you can consider yourself fortunate. After a year filled with new exploits & high profile breaches, it's time to look back at what we learned and look ahead to the trends that will surely have an impact in 2015. Join Mike Rothman, President of Security Analyst firm Securosis, and Patrick Bedwell, VP of Product Marketing for AlienVault, for an entertaining overview of key trends you should consider as you plan for 2015. In this session, Mike and Patrick will cover: Trends in the threat landscape that will bring new infosec challenges How those challenges will affect your network security strategy A 2015 ""shopping list"" of core technologies you should consider to secure your environment in 2015"
Watch Now

Prevention Week Part 2: Defeat Zero-Day Exploits by Automating Prevention

Palo Alto Networks

Your endpoint security should easily prevent known threats. But can it also prevent unknown threats from compromising your environment? More importantly, can it automate this prevention so you don’t have to assign scarce resource to investigate alerts?In this webinar, you’ll discover a revolutionary approach to defeating zero-day exploits. We’ll examine current approaches to exploit prevention, discuss the top 10 zero-day exploits of 2015, and analyze unknown threats on the day they became known.
Watch Now

It’s Time to Think Differently About Network Security

Spikes Security

Something is seriously wrong here. Businesses spend millions every year on the latest security technologies to keep their businesses safe – and then they still get attacked! Why does this continue to happen over and over again, and what can we do about it? This presentation – loaded with compelling research data from many different industry sources – provides revealing statistics on how bad this cyber security problem really is, and why it has continued to get worse despite your best efforts. But, if you’re willing to think differently about network security, there is now a way you can eliminate a huge number of attacks on your network, improve productivity of your IT staff, keep your business safe, and save a significant amount of money in the process. Skeptical, right? Well attend this session, learn the facts, then decide for yourself.
Watch Now

"3 Proven Ways to Unbury Your IT Service Desk"

heat software

"Managing IT services has rarely been as challenging as it is today. Many IT organizations are being called upon to improve service levels while being asked to control costs. In this webinar, you’ll learn about three approaches IT organizations can take to streamline incoming service inquiries to improve productivity, efficiency and agility to handle escalating demands without increasing costs. Join us to learn more about how to: • Cut the incident backlog • Increase first call resolution • Reduce mis-assigned tickets • Create more self-service opportunities • Modernize the user experience • Focus more on business issues and outcomes"
Watch Now

Spotlight

This white paper discusses why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.

resources