Available on demand: SC Magazine eSymposium on New Vulnerabilities

Most successful information thefts are happening because of vulnerabilities in corporate IT infrastructures. Though plugging these holes can be one of the most complex activities for any security team, a plan that addresses this necessary remediation process is critical. 

In SC Magazine's New Vulnerabilities eSymposium, you'll find both educational sessions and opportunities to meet with leading providers in our virtual expo hall to help you address some of the newest vulnerabilities hitting your applications, systems and software.

Various experts will be speaking about the persistent and often complicated challenge of dealing with the unending line of vulnerabilities, zeroing in on some of the more worrisome vulnerabilities that are coming to light and providing some insight on the best action plan to implement for efficient and effective remediation of these holes.

To attend for free, please click here.

Sign up to our newsletters

More in News

House Intelligence Committee OKs amended version of controversial CISPA

Despite the 18-to-2 vote in favor of the bill proposal, privacy advocates likely will not be satisfied, considering two key amendments reportedly were shot down.

Judge rules hospital can ask ISP for help in ID'ing alleged hackers

The case stems from two incidents where at least one individual is accused of accessing the hospital's network to spread "defamatory" messages to employees.

Three LulzSec members plead guilty in London

Ryan Ackroyd, 26; Jake Davis, 20; and Mustafa al-Bassam, 18, who was not named until now because of his age, all admitted their involvement in the hacktivist gang's attack spree.