Sort results by: Published date | Company name

Understand Your Mobile Vulnerability Risks [ Source: Rapid7 ]
November 2012- Do you know how to protect your company data against mobile vulnerabilities? Watch Rapid7's where Dirk Sigurdson, Director of Engineering for Mobilisafe at Rapid7 discusses the importance of understanding mobile vulnerabilities and risks and best practices for mitigation.

This webcast covers:

•  Mobile vulnerability overview and landscape
•   Differences of vulnerabilities including examples categorized as severe
•  How to tackle remediation for mobile vulnerabilities
•  This webcast will also include a ...

[WEBCAST]
Read Abstract | Go to Webcast

Forrester Webinar: "Where Does your data go? Balancing Mobile Consumerization with Data Loss Prevention" [ Source: Good Technology ]
November 2012- When you enable mobile users to work from anywhere, and on their personal device, you increase productivity and profits for your organization. But, the benefits come with a new set of security risks from devices and applications that are no longer under your control.

This webcast, featuring Forrester Research, Inc. VP, Principal Analyst, Chenxi Wang, Ph.D., addresses how to balance the consumerization of IT with data loss prevention.

You'll discover ...

[WEBCAST]
Read Abstract | Go to Webcast

Cyber Security Risk: A Conversation with Richard Clarke about Threats to Enterprise Software [ Source: Veracode ]
May 2012- Join Richard Clarke, author and former White house advisor to the Bush and Clinton administrations as he discusses the changing cyber threat environment, the evolving cyber legislation landscape and their ramifications on your information security program.

In a conversation with Veracode CTO, Chris Wysopal, Mr. Clarke will discuss:

• How software vulnerabilities have become the leading cause of attacks against the private and public sector

• Rise of hactivism and nation ...

[WEBCAST]
Read Abstract | Go to Webcast

Top 10 Mobile Application Risks [ Source: Veracode ]
May 2012- With the DroidDream malware discovery in March, and then Pandora's vulnerabilities identified in April, the inevitable happened: 2011 become the "year of mobile malware". All the pieces of the malware ecosystem puzzle that researchers have been warning about are falling into place. Modern mobile applications run on devices that have the functionality of a desktop or laptop running a general-purpose operating system. While many of the risks are similar to those of traditional spyware, Trojan software, ...

[WEBCAST]
Read Abstract | Go to Webcast

Advanced Authentication Methods: Software vs Hardware [ Source: CA Technologies ]
July 2011- Hardware tokens were a popular method of strong authentication in past years but the cumbersome provisioning and distribution tasks, high support requirements and replacement costs have limited their growth. The additional log-in steps that hardware tokens require and the resulting user frustrations have limited adoption and make them impractical for larger scale partner and customer applications. Now there is now a unique software credential that can provide the security that you need in a transparent ...

[WEBCAST]
Read Abstract | Go to Webcast

How Cyber Terrorists are Exploiting Digital America [ Source: Core Security Technologies ]
February 2010- Core Security Technologies is pleased to invite you to download this on-demand webcast highlighting the continued emergence of targeted threats aimed at government IT assets and agencies.

You’ll gain insight into the rapidly changing government cyber-security landscape from Tom Kellermann, Core Security VP of security awareness; chair of the Threats Working Group on the CSIS Commission on Cyber Security for the 44th Presidency; witness for the Senate Homeland Security and Government Affairs ...

[WEBCAST]
Read Abstract | Go to Webcast
View All