Your Resolution for 2018: Five Principles For Securing DevOps

Veracode

Organizations in today’s market must strike a balance between competitive differentiation and meeting evolving compliance standards-particularly related to software security. They need to obtain faster release and deployment cycles, improved collaboration between business stakeholders and application development and operations teams, and automation tools. DevOps, an innovative organizational and cultural way of organizing development and IT operations work, is addressing this challenge – driven by mounting evidence of its benefits to the business. However reaping these gains requires rethinking application security to deliver more secure code at DevOps speed.
Watch Now

Spotlight

"The popularity of social networking sites has increased
at astonishing levels. There is no arguing the usefulness of sites such as Facebook, Twitter and LinkedIn. They can be used for professional networking and job searches, as a means to increase sales revenue, as a tool to keep the public informed of safety and other issues or as a way to reconnect with friends from way-back-when."

OTHER ON-DEMAND WEBINARS

Security Weekly Webinar: Cyber Threat Intelligence – How to Do It Wrong

ThreatConnect

Tune in to watch Security Weekly’s Paul Asadoorian and John Strand discuss threat intelligence with Jason Cohen, Threat Intelligence Research Engineer at ThreatConnect. Learn about the shortcomings and misuses of threat intelligence to better understand how it can be used effectively and bring real value to your security operations.
Watch Now

Understand and Protect the Modern Attack Surface

Cylance

Join Cylance® as we discuss effective methods of risk management across three main components of the modern attack surface – endpoints, applications, and users. Each component brings with it varying methods of attack and strategies for threat mitigation. In this webinar, Cylance will discuss best practices for minimizing and protecting these critical aspects of your attack surface.
Watch Now

Cybersecurity in a Cloud-Based World

RedVector

Cyberattacks are the fastest growing crime in the U.S., and they are increasing in size, sophistication and cost. During this webcast, subject matter expert Duane Anderson will: Discuss the major vulnerabilities within cloud-based systems. Explain why it’s critical to keep these systems secure. Provide simple actions (ex. browser settings) that can be taken to protect against hacks.
Watch Now

The Pesky Password Problem: How Hackers and Defenders Battle for Your Network Control

KnowBe4

What really makes a “strong” password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about your authentication methods? In this unique webinar you will learn about the recent NIST controversy and related password cracking problems. The “combatants” will be on the one side KnowBe4's Chief Hacking Officer, Kevin Mitnick with decades of first-hand “red-side” penetration testing experience, and on the other side Roger Grimes, KnowBe4's Data-Driven Defense Evangelist with decades of experience on the blue team.
Watch Now

Spotlight

"The popularity of social networking sites has increased
at astonishing levels. There is no arguing the usefulness of sites such as Facebook, Twitter and LinkedIn. They can be used for professional networking and job searches, as a means to increase sales revenue, as a tool to keep the public informed of safety and other issues or as a way to reconnect with friends from way-back-when."

resources