Top 10 Web Hacking Techniques of 2014

"Every year, our adversaries gain more intelligence and the number of attacks on our applications increase. The damage of these attacks are costly to organizations, reaching millions of dollars a year. The Top 10 Web Hacks Webinar, now in its ninth year, represents exhaustive research conducted by a panel of experienced security industry professionals.

In this webinar, you will learn:
•The top web hacks, ranked by your peers and a panel of industry experts
•How to protect your organization against these attacks
•Industry wide research on new advanced attack techniques"
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

How to Fortify Your Organization’s Last Layer of Security – Your Employees

KnowBe4

Cyber security threats continue to proliferate and become more costly to businesses that suffer a data breach. When it comes to combating these growing risks, most organizations continue to place more trust in technology-based solutions than on training their employees to be more aware of the threat landscape and able to recognize the red flags in cyber breach attempts.
Watch Now

Enterprise Phishing Attacks & the Need to Defend Mobile Endpoints

Zimperium

The new GigaOm “Phishing Prevention and Detection: A GigaOm Market Landscape Report,” designed to help C(x)Os and security practitioners evaluate phishing prevention solutions, recognizes that mobile endpoints are poised to be the next high-value target for phishing attacks. The majority of mobile endpoints lack protection beyond Mobile Device Management risk assessments; these endpoints are completely exposed to phishing and other attacks.
Watch Now

AI and Machine Learning: The Future of Cybersecurity in 2023

Join us for an exciting webinar on the cutting-edge technology of AI and machine learning, and how it is transforming the world of cybersecurity. Flare’s Head of Software Development Alexandre Viau, Data/AI Lead Francois Masson, and Director of Marketing Eric Clay will discuss the latest developments in the field, including the innovative GitHub Copilot and ChatGPT, as well as the vendors who are using AI to improve their cybersecurity capabilities. We will also delve into the growing threat of AI-powered attacks, and how organizations can stay ahead of these sophisticated adversaries.
Watch Now

The Key Privileged Access and Security Implications of Granting Third-Party Vendor Access

BeyondTrust

Several different remote access solutions are built into Microsoft Windows to extend third-party vendors access to your systems. In this webinar, Windows and IT security expert Russell Smith weighs in on the pros and cons of using virtual private networks (VPNs), Workplace Join, Remote Desktop Services, and Web Application Proxy to provide third-party remote access.
Watch Now