Your Resource for Information Security Trends & Education
With over 200,000 members, the Information Security Community is the largest community of infosec professionals in the industry. Let's build a network that connects people, opportunities, and ideas. If you are involved in purchasing, selling, designing, marketing ... or using information security solutions - this group is for you. Covered topics include compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more.
5 Mobile Security Insights from RSACJarad Carleton, Frost and Sullivan; Yair Amit, Skycure; Michael Shaulov, Lacoon, Tim Wyatt, Lookout; Kurt Stammberger, MocanaThis panel session moderated by Jarad Carleton of Frost and Sullivan will bring together industry experts from the likes of Lacoon, Skycure and Lookout. Our panelists will discuss the greatest challenges mobile security poses to the enterprise and share their insights and best practices to keeping organizations secure.Read more >
This panel session moderated by Jarad Carleton of Frost and Sullivan will bring together industry experts from the likes of Lacoon, Skycure and Lookout. Our panelists will discuss the greatest challenges mobile security poses to the enterprise and share their insights and best practices to keeping organizations secure.
ESET security researcher Lysa Myers reports on developments in healthcare IT system security that she observed attending the recent HIMSS conference in Orlando. Find out what is being done to better protect patient data privacy.
The increasing awareness of the APT threat landscape has encouraged more customers to leverage technologies based on a virtual execution environment to detect threats that evade traditional defenses. This significantly increases the difficulty for an adversary to penetrate an organization’s network. Does this mean that the adversary can no longer succeed? The reality is – the adversaries rapidly evolve and adapt.
Join our webinar, The Great APT Chase presented by Mr RongHwa Chong, Malware Researcher in FireEye Asia. He will share on how the attacker evolves through exploiting more zero-day vulnerabilities, leveraging new techniques and on the various file formats. to evade heightened defenses. It is a session for both technical and business professionals interested in the latest in advanced threats.
1. Solving A Jurassic Problem
2. How Cyber Threats Evolves
3. To Chase Or Be Chased
4. Questions & Answers
In this webinar, Ron answers the question, "how do we provide for the common defense in the digital age?" With continuous advances in technology, this question can pose a big problem for organizations developing or modifying a security strategy.
Join Ron as he covers the basics of defense against the most problematic vulnerabilities, the tools at your disposal to fight them, and a T.A.C.I.T security strategy that you can implement today in your organization.
The home office. One of the weakest links in the protection of your company’s most valuable assets.
Intellectual property (IP). For today's enterprises, it is more valuable than money, capital or labor - but it is also more vulnerable. Where it is often most at risk is in the home offices of high-value employees, who have sensitive data in their email, but generally have no end-point security.
Join Frost & Sullivan Senior Analyst Mike Jude, and WatchGuard Vice President of Corporate Strategy Dave R. Taylor, as they discuss the small office, home office (SOHO) phenomenon and learn why:
The home offices of high-value employees are a key point of vulnerability for today’s enterprise IP secrets
VPN access, long the standard for protecting communications for home-based employees, can no longer be the stand-alone tactic to repel today’s blended threats
You should consider enabling UTM-level protection for your high-value employee’s home offices
You can enable distributed security, just as you’ve enabled distributed connectivity, so every home office can have the same network security protection as a corporate branch office.
This presentation will take a deeper look at the Webroot® Mobile Data Report, released January 2014, and dive into the interesting details including which app categories are most often associated with malicious apps, which malicious apps were most often detected and which families showed the strongest growth. Additionally, the use of device level security features, such as lost device protection, will be evaluated. In addition to analysis of the report’s data, key mobile security events from 2013 will be discussed and analyzed to expose their real impacts to businesses and users alike. Lastly, taking what was learned in 2013, the presentation will leave you with a number of mobile security predictions for the year to come along with mobile security policy suggestions to ensure you’re prepared.
Think your current approach to network security is lacking the next generation approach? You might be right! Join us for this webinar where Chris Rodriquez, Senior Analyst at Frost and Sullivan, will share current best practices in network security. He’ll cover approaches to network security hardware and software that will help your organization plan for the evolving threat landscape. Marco Ginocchio, Director of Regional Product Management from HP, will discuss how some of the next generation approaches to network security are being actualized in HP TippingPoint products.
The rising scale and complexity of IT has opened more opportunities than ever for abuse and attack. Can our latest advances in data science and software-based environments also redefine threat and risk management options? This presentation highlights examples of new and innovative approaches that successfully have reduced risk even across different-sized organizations.
Over a decade ago, malware primarily entered our networks through malicious emails containing nasty attachments. However, the threat landscape has evolved quite a bit over the past five years.
Today, the Web is the battleground.
While email remains a substantial vector of attack (especially targeted phishing emails), a large majority of today’s network assaults happen via web traffic. In fact, one common blackhat technique combines web applications flaws and client software exploits into a “one-two punch” web attack.
In this fast-paced presentation, Corey Nachreiner, CISSP and the Director of Security Strategy for WatchGuard, covers some of the most common web attacks threatening businesses today. Learn how cyber criminals exploit flaws in our client software to transform innocent looking web sites into treacherous weapons. Also, see why web application flaws can open the door to allowing advanced attackers to lure our web site visitors to malware infested properties—turning our users’ trust against us. For the visual learners, Nachreiner also demonstrates many of these web-based hacks to make sure you understand how they work.
Most importantly, the session covers the security practices that can protect your web servers and applications, as well as all your web-browsing users, from these widespread web-based attacks. If you haven’t built up your web defenses yet, or you just want to learn about the latest web attacks, we hope you join us for this session.