Hi [[ session.user.profile.firstName ]]

OPSWAT

  • Date
  • Rating
  • Views
  • F5 & OPSWAT Webinar: Preventing Cyber Attacks on Web Applications
    F5 & OPSWAT Webinar: Preventing Cyber Attacks on Web Applications Mark Campbell – Security Product Marketing, F5 Networks and George Prichici – Director of Product Management, OPSWAT Recorded: Aug 28 2018 61 mins
    In this webinar, security experts from F5 Networks and OPSWAT will share real-world examples on how cyber criminals can launch advanced attacks through web applications and how to stop them. The most critical web application security risks will be discussed, including file-borne threats on web applications and the joint F5 & OPSWAT solution that addresses these threats. The webinar will include a demo of a simulated web attack.

    After attending this webinar, you will be able to:

    - Identify the most critical web application security risks
    - Understand the best practices for web application security
    - Establish prevention for file-borne threats on web applications
  • Defending the Castle – Back to the Future using Isolated Networks
    Defending the Castle – Back to the Future using Isolated Networks John Alexander, Director of Product Marketing, OPSWAT Recorded: Aug 16 2018 58 mins
    In industries where extreme security is a requirement, like the nuclear, energy, manufacturing, financial, and defense industries, an air gapped network can be an extremely powerful defense. Air gapped networks are like dealing with the past and present at the same time: they harken back to a time before the Internet, but they are also even more useful now because of the Internet, which provides a path for both good and bad activity.

    In this presentation, we’ll discuss the concept of the air gap, or isolated network, and explain what their weaknesses are and when they should or shouldn't be used. We’ll also discuss how, when used correctly, an air gapped network can be such a powerful defense.

    Even though air gaps are extremely powerful defense mechanisms, every defense has its weakness. The key is to minimize these weaknesses by establishing a secure work flow that at the same time reduces the operational productivity concerns that surround air gapped networks. The latter portion of this presentation covers one of the most critical defense measures that is required in an air gap network, "the Kiosk", and best practices in employing "kiosks" as a critical part of an air gapped network defense strategy. We’ll also talk about data diodes, and how they can be employed to help reduce the operational cost of using an air gapped network.
  • Securing IoT: Trust No Thing
    Securing IoT: Trust No Thing Jianpeng Mo - VP of Engineering at OPSWAT & Deborah Galea – Security Evangelist at OPSWAT Recorded: Jun 13 2018 44 mins
    As IoT devices are increasing in popularity, so are IoT cyberattacks. In this Webinar we will describe the characteristics of IoT Advanced Persistent Threats (APTs), discuss the specific challenges of IoT cyberattacks, and provide recommended defense strategies for the IoT environment.

    The following topics will be covered:

    • Recent IoT Security Incidents
    • Reasons for IoT Attacks
    • IoT Security Challenges
    • The IoT Kill Chain
    • Addressing IoT Firmware Vulnerabilities
    • Preventing Threats in IoT Data and Files
    • Securing IoT with OPSWAT


    About the Speakers:

    Jianpeng Mo - VP of Engineering at OPSWAT
    Jianpeng leads OPSWAT development teams for device compliance management solutions. He has been granted 6 U.S. patents for device encryption, network access control, and vulnerability assessment technologies.

    Deborah Galea – Security Evangelist at OPSWAT
    Deborah is a seasoned enterprise cybersecurity expert with 20+ years of experience in the industry and is dedicated to identifying solutions that help companies of all sizes secure the data workflow in their organization. Prior to joining OPSWAT, Deborah co-founded Red Earth Software, a company that specialized in email security solutions for Microsoft Exchange Server.
  • How Upwork Eliminated Zero-Day File Attacks with MetaDefender
    How Upwork Eliminated Zero-Day File Attacks with MetaDefender Teza Mukkavilli, Head of Information Security at Upwork Recorded: Sep 21 2017 27 mins
    Join OPSWAT for an online fireside chat with Teza Mukkavilli, Head of Information Security at Upwork, a leading online freelancing site. Learn how Upwork addressed the threat of zero-day or unknown threats hidden in file uploads. Review how Upwork leverages MetaDefender data sanitization/Content Disarm and Reconstruction (CDR) and multi-scanning technology for advanced threat prevention.

Embed in website or blog