Understand Your Mobile Vulnerability Risks
[ Source: Rapid7 ]
November 2012-
Do you know how to protect your company data against mobile vulnerabilities?
Watch Rapid7's where Dirk Sigurdson, Director of Engineering for Mobilisafe at Rapid7 discusses the importance of understanding mobile vulnerabilities and risks and best practices for mitigation.
This webcast covers:
Mobile vulnerability overview and landscape
Differences of vulnerabilities including examples categorized as severe
How to tackle remediation for mobile vulnerabilities
This webcast will also include a ...
3 Core PCI-DSS Tokenization Models: Choosing the right PCI-DSS Strategy
[ Source: Intel ]
October 2012-
When securing credit card data, the imperative to be PCI DSS compliant remains a constant, while the actual solution implemented by merchants can vary depending on the size and nature of an organization. A solution for a small merchant with low transactions will differ from mid-sized retailers with a web presence - from a large merchant with POS & back-office payment infrastructure.
Securosis.com's expert PCI-DSS analyst Adrian Lane, dissects the deployment models with ...
Leveraging the Advanced Threat Platform to Stay Ahead of the Threat
[ Source: IBM ]
June 2012-
Organizations face consistent attacks from outside the organization as well as inside their organization. They must defend a dynamic ecosystem of applications and computer systems from targeted dynamic attacks. The only hope an organization has to stay ahead of the threat is an Advanced Threat Protection Platform designed to enable customers to customize their infrastructure security needs. During this session John Cloonan, Program Director, IBM Security Infrastructure will discuss the new IBM Advanced Threat Protection ...
Cyber Security Risk: A Conversation with Richard Clarke about Threats to Enterprise Software
[ Source: Veracode ]
May 2012-
Join Richard Clarke, author and former White house advisor to the Bush and Clinton administrations as he discusses the changing cyber threat environment, the evolving cyber legislation landscape and their ramifications on your information security program.
In a conversation with Veracode CTO, Chris Wysopal, Mr. Clarke will discuss:
• How software vulnerabilities have become the leading cause of attacks against the private and public sector
• Rise of hactivism and nation ...
Top 10 Mobile Application Risks
[ Source: Veracode ]
May 2012-
With the DroidDream malware discovery in March, and then Pandora's vulnerabilities identified in April, the inevitable happened: 2011 become the "year of mobile malware". All the pieces of the malware ecosystem puzzle that researchers have been warning about are falling into place. Modern mobile applications run on devices that have the functionality of a desktop or laptop running a general-purpose operating system. While many of the risks are similar to those of traditional spyware, Trojan software, ...
Advanced Authentication Methods: Software vs Hardware
[ Source: CA Technologies ]
July 2011-
Hardware tokens were a popular method of strong authentication in past years but the cumbersome provisioning and distribution tasks, high support requirements and replacement costs have limited their growth. The additional log-in steps that hardware tokens require and the resulting user frustrations have limited adoption and make them impractical for larger scale partner and customer applications. Now there is now a unique software credential that can provide the security that you need in a transparent ...
Cloud I.Am: Content-Aware IAM for the Cloud
[ Source: CA Technologies ]
July 2011-
As you adopt cloud services, time & work of your people, sensitive IP and valuable data are moving away from your control. Perimeter control isn't enough anymore to secure access and data. You need a content-aware identity and access management solution.
In this webcast Ehud Amiri will detail how a content-aware strategy works in the Cloud environment.
5 Critical Data Security Predictions for 2011
[ Source: Perimeter E-Security ]
December 2010-
Last year, enterprises of all sizes saw an exponential increase in the information risks they face. The term "data leak prevention" entered common usage among security professionals, while new buzzwords like "advanced persistent threat" gave them more things to worry about.
Listen to a recorded webcast presented by Andrew Jaquith, Chief Technology Officer for Perimeter E-Security and recent Forrester analyst, as he wraps up the year's top security stories, looks forward to the ...
The Advantages of Cloud-Based Email Archiving
[ Source: Perimeter E-Security ]
January 2011-
Archiving in the cloud has been rapidly growing in popularity, offering a number of benefits, which are attractive to companies of all sizes and all industries. These benefits are especially important in these times of tighter budgets, shrinking IT teams, and increased email volume. However, security and legal compliance of cloud solutions continues to be an area of concern.
Listen to this recorded webcast, moderated by messaging industry analyst Dr. Sara Radicati, and ...
How Cyber Terrorists are Exploiting Digital America
[ Source: Core Security Technologies ]
February 2010-
Core Security Technologies is pleased to invite you to download this on-demand webcast highlighting the continued emergence of targeted threats aimed at government IT assets and agencies.
You’ll gain insight into the rapidly changing government cyber-security landscape from Tom Kellermann, Core Security VP of security awareness; chair of the Threats Working Group on the CSIS Commission on Cyber Security for the 44th Presidency; witness for the Senate Homeland Security and Government Affairs ...