Understand Your Mobile Vulnerability Risks
[ Source: Rapid7 ]
November 2012-
Do you know how to protect your company data against mobile vulnerabilities?
Watch Rapid7's where Dirk Sigurdson, Director of Engineering for Mobilisafe at Rapid7 discusses the importance of understanding mobile vulnerabilities and risks and best practices for mitigation.
This webcast covers:
Mobile vulnerability overview and landscape
Differences of vulnerabilities including examples categorized as severe
How to tackle remediation for mobile vulnerabilities
This webcast will also include a ...
Cyber Security Risk: A Conversation with Richard Clarke about Threats to Enterprise Software
[ Source: Veracode ]
May 2012-
Join Richard Clarke, author and former White house advisor to the Bush and Clinton administrations as he discusses the changing cyber threat environment, the evolving cyber legislation landscape and their ramifications on your information security program.
In a conversation with Veracode CTO, Chris Wysopal, Mr. Clarke will discuss:
• How software vulnerabilities have become the leading cause of attacks against the private and public sector
• Rise of hactivism and nation ...
5 Critical Data Security Predictions for 2011
[ Source: Perimeter E-Security ]
December 2010-
Last year, enterprises of all sizes saw an exponential increase in the information risks they face. The term "data leak prevention" entered common usage among security professionals, while new buzzwords like "advanced persistent threat" gave them more things to worry about.
Listen to a recorded webcast presented by Andrew Jaquith, Chief Technology Officer for Perimeter E-Security and recent Forrester analyst, as he wraps up the year's top security stories, looks forward to the ...