Available on demand: SC Magazine eSymposium on New Vulnerabilities

Share this article:
Most successful information thefts are happening because of vulnerabilities in corporate IT infrastructures. Though plugging these holes can be one of the most complex activities for any security team, a plan that addresses this necessary remediation process is critical. 

In SC Magazine's New Vulnerabilities eSymposium, you'll find both educational sessions and opportunities to meet with leading providers in our virtual expo hall to help you address some of the newest vulnerabilities hitting your applications, systems and software.

Various experts will be speaking about the persistent and often complicated challenge of dealing with the unending line of vulnerabilities, zeroing in on some of the more worrisome vulnerabilities that are coming to light and providing some insight on the best action plan to implement for efficient and effective remediation of these holes.

To attend for free, please click here.
Share this article:

Sign up to our newsletters

More in News

EFF intros wireless router software to boost industry standard

EFF intros wireless router software to boost industry ...

This weekend, the digital rights group released a "hacker alpha" version of its Open Wireless Router software.

Breaches driving organizational security strategy, survey indicates

Breaches driving organizational security strategy, survey indicates

CyberArk interviewed 373 IT security executives and other senior management in North America, Europe and the Asia-Pacific as part of its eighth annual Global Advanced Threat Landscape survey.

Siemens industrial products impacted by four OpenSSL vulnerabilities

The vulnerabilities can be exploited remotely, and fairly easily, by an attacker to hijack sessions and crash the web server of the product.