Upcoming Vendor Webcast

Understanding web bots and how they hurt your organization

The internet is literally crawling with bots. Millions of them scour the farthest reaches of the internet every day, indexing content, testing connections, and making the web more useful overall.

Planning for PCI compliance in the cloud

Virtualization changes everything. The agility and cost efficiencies enabled by virtualization and the cloud are beneficial, as long as you understand why virtualization requires different security.

Exposing risky IT security - Best practices from the testing trenches

Enterprises are racing to shore up on-premises and cloud defenses to avoid being the next security headline. Spending on security technologies is at an all-time high, but how confident are you in vendor decisions and the security architecture you are implementing?

Uncovering the threat: Uniting network and endpoint security for unmatched threat defense

When network and endpoint security solutions team up, the result is a strengthened security posture and a solution that is impossible for attackers to compromise.

Moving beyond proxies

Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy products, providing limited security functionality against today's advanced threats.

How Provident Bank transformed their information protection strategy

A single click by your end users can lead either to a data breach or to data protection. Which would your organization prefer?

PREVIOUS VENDOR WEBCASTS

The ying and the yang of cloud security: Detection & incident response

While the cloud has fundamentally changed the way we do business, it has left organizations feeling vulnerable to attacks. Enterprise security architectures are being extended to include data security for the cloud.

Disrupting the threat: Respond, contain and recover in seconds

As adversaries continue to innovate—designing attacks specifically tailored for your enterprise—being able to respond, contain and recover in a timely manner has never been harder.

Identity requirements for risk and compliance - what you need to know

Identity is a critical component of proving compliance. Whether complying with industry regulations or security best practices, your auditors need to know who has access to what servers and data as well as who exactly did what, where and when.

How to detect SQL Injection & XSS attacks with AlienVault USM

They may be the oldest tricks in the book, but SQL injection and cross-site scripting (XSS) attacks still put a hurt on thousands of web applications every year, impacting millions of users—your users and customers.

Closing the web app data security gap: Dynamic data masking for web applications

The rigidity of web application security controls has left the enterprise vulnerable to data breach.

Leveraging Next-Gen SIEM for security intelligence: A buyer's perspective

Chartered with securing both the PII of over 250,000 physicians and a vast amount of highly valued intellectual property amidst a rapidly evolving threat landscape, Paul Lynch, Director of Data Security and Networks at the American Board of Internal Medicine (ABIM), recognized the need to move beyond a traditional SIEM, and employ a more holistic approach to Security Intelligence.

Back to basics - Ensure both PCI compliance and tighter security

Every business that operates a cardholder environment to transact with its customers is required to maintain compliance to the PCI DSS international standard for security. Penalties for lack of compliance have become costly yet compliance does not equal security.

Five great reasons to embrace mobile in the enterprise

Mobile Devices has seen unprecedented growth since their introduction and now form an integral part of our daily lives. Yet, many Enterprises have not fully embraced mobile as part of their strategy because of too many unanswered questions.

Exploring the digital underworld: Botnets, zero day threats and phishing

Organizations continue to face the ongoing challenges of securing a continually evolving network perimeter. Organized crime has shifted to the digital underworld.

Privileged account exploits shift the front lines of cyber security

Cyber threat investigators discuss privileged account vulnerabilities found in most serious security breaches.

Sign up to our newsletters