Available on demand: SC Magazine eSymposium on New Vulnerabilities

Share this article:
Most successful information thefts are happening because of vulnerabilities in corporate IT infrastructures. Though plugging these holes can be one of the most complex activities for any security team, a plan that addresses this necessary remediation process is critical. 

In SC Magazine's New Vulnerabilities eSymposium, you'll find both educational sessions and opportunities to meet with leading providers in our virtual expo hall to help you address some of the newest vulnerabilities hitting your applications, systems and software.

Various experts will be speaking about the persistent and often complicated challenge of dealing with the unending line of vulnerabilities, zeroing in on some of the more worrisome vulnerabilities that are coming to light and providing some insight on the best action plan to implement for efficient and effective remediation of these holes.

To attend for free, please click here.
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters


More in News

Worm variant of Android ransomware, Koler, spreads via SMS

Worm variant of Android ransomware, Koler, spreads via ...

Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.

Patch for Windows flaw can be bypassed, prompts temporary fix from Microsoft

Patch for Windows flaw can be bypassed, prompts ...

The Windows zero-day received a patch last week, but the fix can still be bypassed by crafty attackers.

Woman charged with using spyware on former cop

Kristin Nyunt of Monterey, Calif., is charged with two counts of illegal wiretapping and possession of illegal interception devices and faces a sentence of up to five years in prison.