Webinar Week: Zero-day Attacks for Defense and Attack

The proliferation of hacking tools known as zero-day exploits is raising concerns at the highest levels in the information security industry and in government, even as U.S. agencies and defense contractors have been named as the “biggest buyers of such products”. As one data breach after another is the result of a zero-day attack, the industry needs to continue its research on the blueprint of a 0-day and continue to evolve defense technology. This webinar will also address the use of 0-day exploits in the increasingly publicized ‘hack back’ movement.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Top Ten Ways to Handle Contracts Effectively In-House

Handling a large number of contracts is a fact of life for most in-house attorneys – with an ever-increasing volume and tight deadlines, even before a M&A or other event triggers a voluminous contract review. But it doesn’t have to be chaotic or disorganized: with the right processes and tools you can provide strong, responsive
Watch Now

Building Blocks for Your IT Security Program

AT&T Cybersecurity

Implementing effective asset discovery and vulnerability assessment are two of the most important first steps in improving IT security. Before you can protect your environment, you need to understand what assets you have across your cloud and on-premises environments, and be able to identify and prioritize vulnerabilities.
Watch Now

Introduction to Kubernetes Security

Aqua

Kubernetes is fundamentally a complex system with lots of different potential attack vectors aimed at data theft, currency mining and other threats. Liz Rice, a renowned technology evangelist, will take us through an overview of the current state of security-related features in Kubernetes, and offer directional starting points on how to secure Kubernetes components and the applications that run on top of these Kubernetes components. Brice Fernandes, software engineer and entrepreneur at Weaveworks, will then demonstrate how you can build a secure and reliable Kubernetes deployment pipeline with GitOps best practices, separating the responsibility between packaging software and releasing it to a production environment.
Watch Now

Changing the Entire Paradigm to Cybersecurity

Most cybersecurity protections are based on looking for threats. The problem is, malware is evolving at an alarming rate and threat detection solutions, antivirus and EDR can no longer keep up. ThreatLocker CEO, Danny Jenkins will explain how he’s changing the entire approach and paradigm to cybersecurity with a clean and comprehensive approach to ensuring ransomware does not end up in your environment.
Watch Now