Secunia Channel

Channel profile:

Take pre-emptive action against vulnerabilities and security breaches

Secunia is recognised industry-wide as a pioneer and global player within the IT security ecosystem, in the niche of Vulnerability Management. Our award-winning portfolio equips corporate and private customers worldwide with Vulnerability Intelligence, Vulnerability Assessment, and automated Patch Management tools to manage and control vulnerabilities across their networks and endpoints.

Subscribers (4,548)
Understanding Software Vulnerabilities Thousands of vulnerabilities are disclosed every year, by vendors/researchers discovering software vulnerabilities for remediation and security, as well as by cybercriminals seeking vulnerabilities to sell or exploit.

Relaying the right threat intelligence to the right stakeholders and initiating the right threat response is a challenging task for security professionals, more so now because enterprise environments have become complex hotbeds of new technologies, business models and ways of storing/sharing information.

This webinar deconstructs software vulnerabilities, shows how they relate to the wider ecosystem and demonstrates how this knowledge can be used to define strategies and improve security.

Key takeaways:

- The impact of software vulnerabilities on organizations
- The importance of vulnerability research for the overall security of individuals and organizations
- The importance of trusted sources for vulnerability information
Read more >
Apr 8 2014
33 mins
Play

Webinars and videos

  • Live and recorded (29)
  • Upcoming (0)
  • Date
  • Rating
  • Views
  • Thousands of vulnerabilities are disclosed every year, by vendors/researchers discovering software vulnerabilities for remediation and security, as well as by cybercriminals seeking vulnerabilities to sell or exploit.

    Relaying the right threat intelligence to the right stakeholders and initiating the right threat response is a challenging task for security professionals, more so now because enterprise environments have become complex hotbeds of new technologies, business models and ways of storing/sharing information.

    This webinar deconstructs software vulnerabilities, shows how they relate to the wider ecosystem and demonstrates how this knowledge can be used to define strategies and improve security.

    Key takeaways:

    - The impact of software vulnerabilities on organizations
    - The importance of vulnerability research for the overall security of individuals and organizations
    - The importance of trusted sources for vulnerability information
  • Every year Secunia releases a review of the vulnerability landscape, based on its vulnerability research and data from its Personal Software Inspector (PSI) user base.
    The data in this research helps security professionals around the globe make sense of the evolution of the threat landscape and the trends throughout the year.
    In this webinar, Secunia’s CTO, Morten Stengaard and Head of Research, Kasper Lindgaard, will interpret the data presented in the Secunia Vulnerability Review 2014 and answer questions. The review will be released on 26th February at 20:00 CET.
    Before 26th February, you can pre-register to receive a copy of the review as soon as it is released, at:
    http://secunia.com/resources/reports/vr2014/

    Key takeaways:
    -The number of vulnerabilities and zero-days detected in 2013
    -The security state of browsers and PDF readers
    -How quick vendors are to respond to vulnerabilities
    -Which programs are more vulnerable
  • In this webinar, we will look at how to integrate patch management into the vulnerability management lifecycle, to support organizations in developing processes that allow targeted remediation and mitigation of threats.
    In a previous presentation (see attachments), we examined how a well-known vulnerability in an application led to a security breach in the U.S. Department of Energy, with significant financial impacts.
    Many factors contributed to the extensive damage caused by the attack. But the bottom line spelled it out: If a patch management process properly integrated with a vulnerability management lifecycle approach had been in place in the Department of Energy, mitigation actions could have been implemented and, ultimately, the breach would not have occurred.
    It is precisely because we continue to disregard the fact that patch management is an important security control that we continue to see attacks exploiting well-known vulnerabilities.
    There are many reasons why patch management is neglected as a security tool:
    •Manually applying all patches to all applications on all machines and servers is not feasible.
    •Patch management is often perceived as the mechanics of packaging and deploying software updates.
    •The abundance of devices and the interconnectivity between organizations, partners and customers has increased the attack surface significantly. And not all devices can be managed centrally.
    •Most of the solutions for patch management that are available in the market only focus on delivering patch content and deployment capabilities.
    Sign up for this webinar on why and how to integrate patch management into the vulnerability management lifecycle.
    Key takeaways:
    -The reasons for improving your patch management process
    -Key considerations of a security approach to patch management
    -How to integrate patch management within the vulnerability management lifecycle
    -Examples of how to justify the investment in patch management technology
  • This Webinar is a follow-on session from part 1 presented at System Center Universe and will focus on advanced ways to gather use data within System Center Configuration Manager (ConfigMgr); it will build on the part 1 material including some advanced inventory techniques including the use and creation of data discovery records (DDRs). It will also tackles some of the common challenges and how to overcome them when gathering data from managed systems.
  • Join this webinar to hear directly from Icelandair how the international airline took a more proactive approach to preventing cyber attacks.
    In this session, Icelandair will describe the IT security challenges the company faced and how security issues led to investigating solutions that addressed these issues.
    Learn about the security strategy and measures Icelandir have implemented to ensure a robust security platform – specifically in the area of vulnerability intelligence, patch management and patch deployment integration in a Microsoft environment, using System Center Configuration Manager and WSUS.

    Key take aways:

    - Learn from a real-life experience and related insights
    - Understand why it’s important to be proactive instead of reactive
    - 15 minute Q&A with Icelandair and Secunia security specialists
  • In July 2013 the US Department of Energy suffered a breach caused by a known vulnerability in one of the applications used to store personal data from employees and their family members. A total of 104,000 records were exposed. Following the incident, the department investigated the chain of events that led to the breach.

    The case illustrates some of the common challenges that organizations face when attempting to maintain the security of their technology environments.

    The challenges include: fragmented infrastructures and heterogeneous environments; competing priorities between business units; unclear lines of responsibility and undocumented processes; lack of urgency and awareness over cyber security issues and the skills to assess risk; inadequate authority; and ineffective internal communication and coordination.

    The in-depth scrutiny of the causes and consequences of this breach gives us the opportunity to reflect upon the challenges we face within our own organization. A case such as this shows that, while basic security principles seem obvious and easy to implement – and many of us assume they are in place – reality can sometimes prove to be very different to theory and best practice recommendations.

    Join us, when we analyze the case and the data showing the importance of maintaining an overview and control over IT environments.

    Key takeaways:
    -Insights into the common challenges that organizations face when implementing an IT security strategy
    -Data on the cost and consequences of data breaches
    -Best practices for implementing a security baseline
    -The importance of vulnerability intelligence to support risk assessment
    -The importance of mitigating actions to avoid security breaches
    - Q&A session
  • Intelligence is power. As part of our "We Speak Geek" Webinar series, Secunia partners with some of the most recognized System Center experts to present on topics that are informational and important to you.

    Join us on Tuesday, Dec 17th at 1:00pm CST for our next We Speak Geek Webinar. During this 45 minute presentation, systems management expert, Nash Pherson, will walk through application management best practices for Microsoft’s Configuration Manager (ConfigMgr) in the enterprise. He will discuss methods for making silent, supportable, clean, and complete application deployments for the Java Run Environment, and demonstrate how Secunia’s Corporate Software Inspector (CSI) simplifies this process and enables enterprises to keep applications up-to-date with ConfigMgr Software Update Management.
  • Join this webinar to learn about the latest trends in hacker prevention and emerging threats facing medium to large companies in the private and government sectors.

    We’re becoming more efficient, faster and better connected. This is great, but unfortunately, this also means that hackers are becoming more sophisticated.

    Cyber-attacks are increasing at an exceptional rate, the threat landscape has never been so fierce, and it is highly important to understand the attack surface. By moving more and more to the cloud, and BYOD becoming very common, do you have a constant and clear picture of what your own IT landscape looks like – and the vulnerabilities across your environment? Do you know what the attack vector is? Is your organization aligned and prepared for the emerging modern day threats?

    Key take-aways:

    - Learn about Advanced Threat Protection
    - Understand why it is important to be proactive instead of reactive
    - Learn how to reduce security risks by a proactive defence: Defend yourself pre-emptively before an attack happens
    - 15 minutes Q & A with a Secunia Solution Specialist!
  • Cybercrime is the second most commonly reported economic crime in the Financial Services sector, and vulnerabilities in software have been primarily responsible for some large-scale security breaches.

    Your financial institution is only one vulnerability away from being compromised. Corporate board members are also vulnerable to cyber-attacks, storing personal information on their home computers and personal mobile devices. This Webinar will address where the threats are coming from and outline an action plan for identifying, managing and remediating them.
  • Join this webinar to learn about the latest trends in vulnerability threats facing large companies in the private and government sectors.

    Understanding the landscape and the attack surface of the most widely used applications and operating systems is a key component of a robust Application Security effort. Are you addressing this critical area of your security strategy? Do you have a constant and clear picture of what your own IT landscape looks like, and what the attack vector is, for example in regards to BYOD?

    Ask yourself: What is your status right now?

    We will also discuss a few highlights from a recent report written by NIST (National Institute of Standards and Technology), and look at select Secunia Country Reports on vulnerability exposure, based on data extracted from millions of users, across Europe and North America.

    Key take-aways:
    -Learn more about Software Inventory Management and Patch Implementation Verification
    -Understand why traditional anti-virus and a firewall alone is not enough
    -Learn how to reduce security risks by being proactive instead of reactive
    -How to explain to the Board why Application Security is a worthwhile investment
    -15 minutes Q & A with a Secunia Solution Specialist!

Embed in website or blog