Understanding the Attack Landscape - Your Best Defense in Today’s State of Cyber Security

As we reflect on the state of security this past year, it’s evident that cybercriminals continue to be successful with a trusted set of techniques proven effective against common vulnerabilities and misconfigurations. Attackers looking to make a buck prey on businesses of all sizes. Fortunately, by understanding what the attack landscape looks like, where the next attacks will be coming from, and what your attackers might be after, you can achieve top-strength security. Join this session to hear how attackers are infiltrating enterprise environments and how you can learn from them. We’ll dive into real case studies and provide actual code samples.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Understanding Cloud Security Benefits and Challenges

Vulnerabilities in the cloud are growing in number and severity, and risk leaders must learn how to respond. IBM reports that cloud vulnerabilities have increased 150% in the last five years. We are witnessing a global digital transformation, and cloud computing is the foundation and future of the digital world. It offers many benefits, but it’s crucial to understand what cloud security means and how to secure your data, applications, infrastructure, and workloads. In this free webinar, we get advice from Amazon and Google cloud security experts on how organizations can benefit from cloud security services and features and the challenges around people, processes and technologies when adopting the cloud.
Watch Now

5 Security Measures You Need to Take to Keep Your Business Safe from Ransomware

Businesses are under attack, hackers are getting smarter, and the cost of a ransomware attack is going up. The average cost of an attack for small to medium size businesses? $200,000. For enterprise organizations, attacks cost, on average, $14.8 million annually. And even, scarier, 60% of small to medium-sized businesses that are hacked go out of business within six months.
Watch Now

What Salesforce Customers Need to Know About China’s Data Security Law

On September 1st of this year, China’s Data Security Law went into effect, including strict guidelines on data residency. Combined with the existing Cybersecurity law and the PIPL regulation to come into effect on November 1st, this creates new requirements for data storage and processing. Companies that do business in China may need to keep some data in China only. This has significant implications for global companies that rely on Salesforce.
Watch Now

Reduce API Security Risks with Automated and Continuous API Scanning

Digital businesses have widespread API usage that makes it easier for organizations to share data and integrate with customer applications. However, since APIs expose application logic and sensitive data such as Personally Identifiable Information (PII), APIs have increasingly become a target for attackers leading to many serious data breaches in recent past. Gartner estimates that by 2022, API abuse will become the most-frequent attack vector, resulting in data breaches for many organizations.
Watch Now