Channel Futures
Email phishing remains a top security threat. Even smart and savvy people are fooled everyday by these malicious emails. They’re even harder to spot now that bad actors use information from social media to personalize their attacks against your customers and your business. In this webinar, Brian Wickenhauser, Mastercard’s Vice President of Security Events Management, will share examples of phishing attempts, how to spot them, ways to combat them and tips for improved safety – all important information to add to your security training programs.
Watch Now
Veracode
Organizations in today’s market must strike a balance between competitive differentiation and meeting evolving compliance standards-particularly related to software security. They need to obtain faster release and deployment cycles, improved collaboration between business stakeholders and application development and operations teams, and automation tools. DevOps, an innovative organizational and cultural way of organizing development and IT operations work, is addressing this challenge – driven by mounting evidence of its benefits to the business. However reaping these gains requires rethinking application security to deliver more secure code at DevOps speed.
Watch Now
WorkCast
Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us and Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, we'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.
Watch Now
Nopsec
Michelangelo Sidagni, CTO and Parag Baxi, VP of Product Management, discussed customer comments from 2018. They covered vulnerability management complaints, requests, wishes and hopes. They have set some goals for the vulnerability management market for 2019 and discussed those goals on this webinar! Michelangelo & Parag Covered: Vulnerability scanning goals. Determining asset value. Attack Predictions: when will a vulnerability become dangerous? Vulnerability categorization. Remediation Goals.
Watch Now