The Nightmare After Christmas: Plugging the Mobile Security Gap

Lookout

Personal devices are now very capable and every bit as powerful as PCs were a few years ago. And people expect to be able to use their devices at work: Mobile is the new normal. This holiday season, mobile devices - especially tablets or cell phones  -are likely to be once again set to be a very popular gift.Yet while unwrapping a shiny new gadget might well bring joy to employees, for security teams the problems really start in January when people try to connect such devices to the office network.
Watch Now

Spotlight

Do you want to anticipate cyber exploits? With so many threats and exploits in the wild, its difficult to know which vulnerabilities will result in an actual exploit and cause harm. Making early assessments can help security managers discover possible threats in advance and prioritize vulnerability management. In a new research study, Recorded Future found that cyber exploits can be anticipated with an accuracy of 83% using open vulnerability data. The report is now available to the public and ready for download on this page. Get your copy now!


OTHER ON-DEMAND WEBINARS

The State of Cloud Security: Results of the SANS 2019 Cloud Security Survey

Sysdig

Cloud is part of today's infrastructures, and infrastructures are part of clouds. Are security infrastructures maturing to support the business and improve risk management in the cloud model? How are organizations using the public cloud to meet their business needs? This webcast will explore the results of the SANS 2019 Cloud Security Survey, conducted in cooperation with the Cloud Security Alliance, concerning organizations' use of the public cloud and will provide actionable advice for attendees to improve their cloud security. Attendees will learn about the: Types of applications that are implemented most frequently through the cloud. Number of public cloud providers most organizations use.
Watch Now

Web Security Wish List for Effective Network Protection

"You deserve to have everything you want for Web Security. Here is what’s likely on your wish list. •Effective protection against advanced cyber attacks •Safe application enablement •Unwanted and high-risk websites blocked •Simple deployment of one appliance to cover everything •No call for emergency responses Learn how a next-generation web security solution can deliver what legacy, proxy-based alternatives don’t. Watch this webinar as your first step to making your network more secure and your life easier."
Watch Now

"Six Steps to SIEM Success"

Alienvault

"The promise of SIEM is clearly an essential one – aggregate, correlate & analyze all of the security-relevant information in your environment so that you can: Identify exposures Investigate incidents, Manage compliance Measure your information security program However, going from installation to insight with a SIEM can be a challenge. Tune in for this webcast to learn 6 practical steps every IT admin should take before embarking on a SIEM deployment."
Watch Now

Advanced DDoS Attack Protection

Arbor Networks

Government Agencies, Enterprises and Service Providers all experience continuous cybersecurity attacks that often begin with Distributed Denial of Service (DDoS) attacks. DDoS attacks are a world-wide phenomenon impacting all industries, are more complex than ever before, and are increasing in size and frequency. It has never been easier to launch a DDoS attack because DDoS attack tools and DDoS for Hire Services are accelerating the weaponization of DDoS. On this webinar our experts will address several key DDoS issues. You will learn about: The latest DDoS attack trends and recent examples of destructive attacks.
Watch Now

Spotlight

Do you want to anticipate cyber exploits? With so many threats and exploits in the wild, its difficult to know which vulnerabilities will result in an actual exploit and cause harm. Making early assessments can help security managers discover possible threats in advance and prioritize vulnerability management. In a new research study, Recorded Future found that cyber exploits can be anticipated with an accuracy of 83% using open vulnerability data. The report is now available to the public and ready for download on this page. Get your copy now!

resources