No matter what industry you’re in, the spectrum of cyber attackers who are targeting you is growing. Financially-motivated cybercriminals, nation-state-sponsored intelligence gatherers, politically-motivated hackers, and even your competitors are among those who might be testing your systems today. In Dark Reading’s virtual event, Why Cybercriminals Attack, top industry experts will offer a range of …
Dark Reading’s virtual event “Understanding Cyber Attackers and Cyber Threats” will offer a deeper insight into the “bad guys” of cyberspace and what threats are the most likely to affect your organization. Join Senior Security Associate Andy Jordan from 3:45 – 4:30 PM ET on June 21st as he participates on the panel
Attack surfaces are growing every day as companies adopt technologies like cloud and the Internet of Things. IT security’s traditional ‘layered defense” may not be enough to protect organizations. Join Dark Reading’s webinar “Building a Cybersecurity Architecture to Combat Today’s Risks” from 10:00-11:00 AM MST on March 15th. Partner Christie Terrill will discuss …
Dark Reading’s virtual event “Re-Thinking Your Enterprise IT Security Strategy” will offer an in-depth look at some of the myths surrounding enterprise data defense – and how new technologies, better architectures and new ways of thinking could put your business on a path to a more effective enterprise security strategy. Join Partner Christie Terrill …
BetterCloud’s webinar – Master the Strategies and Tactics of Leading Cloud IT Pros – will feature tactical sessions with step-by-step approaches to better your IT environment and strategical sessions to learn from seasoned IT innovators who are successfully navigating the shift to the cloud. Join Senior Security Analyst Alijohn Ghassemlouei on Tuesday, October 25th from 3:30-4:15 …
As more and more enterprises fall victim to cyber breaches, many IT security experts say that data encryption is the best solution to protecting critical data. But what’s the right encryption strategy for your organization? There are a broad range of choices, and making the wrong one could affect network performance and administrative complexity as …
What makes us human? Language, empathy, and helpfulness are only a few of the traits that make us unique. However, these fundamental characteristics also leave room for deception. Social engineering is nothing new. From the Trojan Horse that collapsed Troy to Frank Abagnale’s famous deceptions portrayed in the film “Catch Me If You Can,” conmen …
Most attacks on retail and e-commerce websites are conducted by cyber criminals who want to steal large databases of personal information and credentials. In this session, we offer a closer look at the methods used to penetrate a retailer’s back-end systems – including targeted attacks on databases, DDoS “smokescreens” used to obfuscate more sophisticated exploits …
Once an online business has shored up its defenses against new threats, it must develop an ongoing program for monitoring its systems for potential compromises – and measuring the risk faced by the business. In this session, we offer tips for building systems and processes for tracking threat and fraud indicators, and for creating real …
One of the greatest challenges in e-commerce is to build a website that is extremely easy for customers to access and use – but extremely difficult for online criminals to attack. In this session, we offer an overview of defenses against Internet-based threats — including DDoS attacks, DNS exploits, and cross-site scripting – to help …
In the past, malware defenses have been built on “signatures” that recognized malicious code and blacklisted it before it could infect the enterprise. But today’s malware is often designed to evade this defense by changing its shape and creating new code that signature-based defenses have never seen before. How can enterprises shift their defenses to …
Brenda Larcom (and 7 other IT experts) shares her thoughts around security, the promise of agile, key trends, and best practices. Watch this webinar and hear how these organizations have harnessed the power of Agile.
Dale Vile and Jon Collins analysts at Freeform Dynamics; Caleb Sima, Chief Technologist at HP; and Vinnie Liu, Managing Partner at Stach and Liu dish-out practical advice and insight, based on their real world experience of tackling application security with tight budgets and looming deadlines.
Vincent Liu, Managing Partner of Stach & Liu, along with HP Application Security Center’s Caleb Sima and Chenxi Wang of Forrester Research, provide a presentation about why corporations with seemingly insurmountable application security issues would do well to implement a SaaS solution. Tight timelines, limited budgets, and a lack of security experts? Compliance deadlines and hundreds of applications to secure? Learn how companies can leverage SaaS to meet these challenges.
Vincent Liu and Hewlett Packard’s application security experts discuss how to: increase coverage through a Security Center of Excellence; expand your reach through a shared service model; target high risk applications with asset identification and data classification; improve accuracy with the latest innovations in Web 2.0 assessments; launch an SDL security program with developers and …