Upcoming Vendor Webcast

Closing the web app data security gap: Dynamic data masking for web applications

The rigidity of web application security controls has left the enterprise vulnerable to data breach.

How to detect SQL Injection & XSS attacks with AlienVault USM

They may be the oldest tricks in the book, but SQL injection and cross-site scripting (XSS) attacks still put a hurt on thousands of web applications every year, impacting millions of users—your users and customers.

PREVIOUS VENDOR WEBCASTS

Leveraging Next-Gen SIEM for security intelligence: A buyer's perspective

Chartered with securing both the PII of over 250,000 physicians and a vast amount of highly valued intellectual property amidst a rapidly evolving threat landscape, Paul Lynch, Director of Data Security and Networks at the American Board of Internal Medicine (ABIM), recognized the need to move beyond a traditional SIEM, and employ a more holistic approach to Security Intelligence.

Back to basics - Ensure both PCI compliance and tighter security

Every business that operates a cardholder environment to transact with its customers is required to maintain compliance to the PCI DSS international standard for security. Penalties for lack of compliance have become costly yet compliance does not equal security.

Five great reasons to embrace mobile in the enterprise

Mobile Devices has seen unprecedented growth since their introduction and now form an integral part of our daily lives. Yet, many Enterprises have not fully embraced mobile as part of their strategy because of too many unanswered questions.

Exploring the digital underworld: Botnets, zero day threats and phishing

Organizations continue to face the ongoing challenges of securing a continually evolving network perimeter. Organized crime has shifted to the digital underworld.

Privileged account exploits shift the front lines of cyber security

Cyber threat investigators discuss privileged account vulnerabilities found in most serious security breaches.

Application control is more than whitelisting-It's monitoring, visibility, protection & default deny

Application Control technology is more than just whitelisting. Organizations have found significant value via full visibility into server and desktop environments by continuously monitoring and observing application behavior.

Prepare for the breach: Detect, respond and disrupt at the moment of compromise

Many organizations over invest in network security solutions—relying on traditional antivirus to secure their endpoints.

Secure agile development: Why can't we all get along?

Security teams are sharply focused on bringing security to applications and meeting compliance requirements in the delivery of these applications and services.

Your data's gone mobile: Keep it secure

There now are more mobile devices on the planet than humans, and cyber criminals are targeting them at an increasing rate.

PHI is more valuable than credit cards: Time to get serious about data security!

News about data breaches in the healthcare sector continues unabated.

Sign up to our newsletters