Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Web Applications: Secure Your Most Exposed Attack Surface w/ Brinqa & Netsparker
    Web Applications: Secure Your Most Exposed Attack Surface w/ Brinqa & Netsparker Syed Abdur, Brinqa, Director of Product & Ferruh Mavituna, CEO, Netsparker Recorded: Mar 15 2018 64 mins
    Web applications are a prime target for hackers. According to the Verizon DBIR 2017 report, web application attacks were the #1 source of data breaches in the past year. With increasing attacker sophistication and a growing web application footprint for most businesses, investing in the cutting edge of web application vulnerability detection and remediation is crucial.

    Two technologies leading the charge are NetSparker and Brinqa.Netsparker is a scalable and dead accurate enterprise web application security solutions that enables businesses to easily identify vulnerabilities in web applications and APIs.Brinqa is a cyber risk management platform that helps security professionals triage and remediate application vulnerabilities in context of likelihood of weaponization and impact to business.

    In this webinar we discuss how these two innovative technologies work together to create a comprehensive web application security program that helps AppSec programs identify, prioritize, remediate and report the most imminent and impactful vulnerabilities in your organization's software infrastructure.
  • Automating Vulnerability Risk Management, An Essential Cybersecurity Strategy
    Automating Vulnerability Risk Management, An Essential Cybersecurity Strategy Syed Abdur, Brinqa, Director of Product and James Walta, Brinqa, Sales Engineer Recorded: Mar 8 2018 63 mins
    Vulnerability management is consistently ranked among the top priorities for information security organizations. With an ever-growing attack surface and increasingly sophisticated malicious actors, traditional approaches to vulnerability management are struggling to keep pace with the changing threat landscape. Inconsistent, inefficient, manual processes to analyze, triage and remediate vulnerabilities doom many organizations to a never-ending game of catch-up.

    In this webinar, we’re going to explore a strategy that can help organizations break out of ‘whack-a-mole’ vulnerability management cycles and begin to secure their IT infrastructure proactively : Automation.

    Join this webinar to learn how you can automate large parts of the vulnerability risk management process, including:

    * Create accurate asset and vulnerability repositories
    * Prioritize vulnerability risk based on business context and threat intelligence
    * Group vulnerabilities into tickets, assign ownership and enforce SLAs
    * Engage and inform all stakeholders
  • Demo : Self-Service Metrics & Reporting
    Demo : Self-Service Metrics & Reporting Syed Abdur, Brinqa, Director of Product Recorded: Feb 26 2018 28 mins
    All Brinqa applications include powerful self-service reporting capabilities. Using Brinqa Risk Analytics end-users can create detailed actionable reports for their risk, operations and business audiences. In this video we will walk you through creating a vulnerability report from scratch.

    Some metrics represented in this report :
    Critical Vulnerabilities
    Exploitable Production and External Vulnerabilities
    Most vulnerable host and CVE
    Vulnerability Risk by OS and Ownership
    Most Vulnerability Operating Systems
    Vulnerability Risk Trend
    In the video we will cover how you can :
    Create single value metrics
    Create tables and lists
    Create visual metrics including pie, bar, columns charts
    Create trend charts
    Style reports with extensive appearance options
  • Building a Comprehensive Cyber Risk Program
    Building a Comprehensive Cyber Risk Program Syed Abdur, Brinqa, Director of Product Recorded: Nov 13 2017 28 mins
    In this session, presented originally at the Qualys Security Conference is Las Vegas on Oct 19 2017, we discuss how Brinqa customers are creating a new breed of cyber risk intelligence programs by making Qualys vulnerability management a central focus of their efforts.

    These programs take vulnerability management effectiveness to a new level, by introducing automation at every step of the process – whether it is integration and correlation of data from multiple sources, prioritization of vulnerability and asset risks, creation and management of tickets based on optimal remediation strategies, or representation and distribution of real-time metrics and KPIs.

    By taking these core capabilities and applying them to additional sources of security data — asset inventory, network management, web application scanning, BC/DR, policy compliance, IDS/IPS, change and configuration management, directory services, SIEM, etc. — these programs are providing security analysts, business owners and executives with actionable insights that were previously unattainable.

Embed in website or blog