Secunia Channel

Channel profile:

Take pre-emptive action against vulnerabilities and security breaches

Secunia is recognised industry-wide as a pioneer and global player within the IT security ecosystem, in the niche of Vulnerability Management. Our award-winning portfolio equips corporate and private customers worldwide with Vulnerability Intelligence, Vulnerability Assessment, and automated Patch Management tools to manage and control vulnerabilities across their networks and endpoints.

Subscribers (7,475)
Understanding Software Vulnerabilities Marcelo Pereira, Product Marketing Manager at Secunia This webinar is for business leaders who wish to understand vulnerabilities in commercial software and how they can impact organizations:
Software vulnerabilities remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or as the enabler of privileges escalation inside networks.
This webinar demystifies software vulnerabilities, shows how they relate to the wider ecosystem and demonstrates how this knowledge can be used to define strategies and improve security.
Key takeaways:
-What is a software vulnerability
-How a software vulnerability becomes a threat
-A glimpse of how threats multiply
-How closing vulnerabilities impacts risk reduction
Read more >
Aug 4 2015 2:00 pm
UTC
30 mins
Attend
  • Live and recorded (24)
  • Upcoming (3)
  • Date
  • Rating
  • Views
  • Globally, we are seeing an increase in Advanced Persistent Threats (APT) and targeted attacks. And while the strategy applied to choosing which organizations and assets to target is increasingly sophisticated, the methods are the same as always: exploiting well-known vulnerabilities that could have been mitigated with simple and fundamental controls.

    In this webinar, Secunia’s new CTO Santeri Kangas will use real-life examples to demonstrate how hackers actually exploit vulnerabilities, and illustrate the risk organizations are effectively accepting, when they neglect the fundamentals of IT security. Kangas also discusses how organizations can strengthen their resilience to attacks that exploit publicly known vulnerabilities, and explain why business leaders are central players in saving the company bacon: they need to get behind the efforts to get security fundamentals right.
  • You have System Center 2012 Configuration Manager implemented in your environment, and you are realizing great results with it. However, can you take it a bit further to gain even more benefits? You sure can, and Cireson can help. In this session, Wally will introduce you to the Cireson Remote Manage app, which can assist your help desk in supporting their clients, as well as Cireson Asset Management, which can provide full asset management capabilities that leverage your Configuration Manager investment.

    Attend this session and learn:

    · How the Cireson Remote Manage app can assist your help desk analyst in supporting their customers
    · How to enhance asset management capabilities of Configuration Manager with Cireson’s Asset Management capabilities to provide financial and business data tied into your software and hardware assets
    · How to manage 3rd party software with ConfigMgr and how Secunia can enhance that process
  • Every year, Secunia Research releases a review of the global vulnerability landscape, based on their large vulnerability database and data from the Secunia Personal Software Inspector (PSI) user base.

    The data in this research provides security professionals around the world with perspective on the impact and evolution of the threat landscape and what has trended throughout the year.

    In this webinar, Secunia’s Director of Research and Security Kasper Lindgaard will discuss the data presented in the Secunia Vulnerability Review 2015 and answer questions.

    The review itself was released on March 25.

    You can download a copy of the review on our website:

    www.secunia.com/VR2015

    Key takeaways:

    - The number of vulnerabilities and zero-days detected in 2014

    - How quick vendors are to respond to vulnerabilities

    - Which programs are more vulnerable

    - How products bundled with open source applications and libraries affect security
  • If your intuitive response to the risk of targeted attacks is to run and get some Advanced Threat

    Protection, do yourself a favour and take a step back. The reality is that, while the number of advanced

    attacks has been increasing, the vast majority of cases still use fairly simple techniques and exploit

    publically known vulnerabilities that can be solved by regular patching or other mitigation actions.

    In this webinar we will talk about how you should use vulnerability intelligence to reduce the attack

    surface for hackers and strengthen resilience before you think of implementing ATP solutions.

    Key takeaways:

    - An overview of a multi-layered security approach

    - How to leverage vulnerability intelligence to reduce risk
  • During this webinar, we will discuss the process of deploying a Microsoft System Center 2012 Configuration Manager lab environment on the Microsoft Azure platform, by using Desired State Configuration, the Azure PowerShell module, and general PowerShell automation.
  • In this webinar, Andrei Vilcan will present his approach to Information Security and how he and his team work to mitigate the risk of Advanced Persistent Threat attacks at Banca Transilvania.
    He will introduce the aspects of the multi-layered approach to the Information Security strategy he is in charge of implementing, the challenges he faces and his achievements so far.
    As a Secunia CSI user, he will share how the solution helps him in one of the key areas of his strategy: security patch management.

    About Andrei: Andrei is Head of Information Security at Banca Transilvania. He has 23 years of experience in IT Management, the past 6 of which is in IT Security. He works to protect his organization’s assets, including customer data, to ensure that the business can operate without disruptions.
  • In April, one fairly minor vulnerability - Heartbleed - sent the IT community reeling. Since then we’ve had Shellshock/Bashbug and Poodle.

    2014 was a year of high profile cases that effected massive changes in the IT community - and the lessons learnt should stay top of mind.
  • RISK.

    Managing risk must start with reducing the cracks and holes through which unwelcome visitors can gain access to any valuables you want to protect.

    Software vulnerabilities are often the entry points used by cybercriminals to get into organizations and escalate attacks. For that reason, having a comprehensive overview and accurate information on software vulnerabilities is one of the critical factors to assess risk and prioritize the actions that will have a strong and consistent impact on reducing the attack surface.

    The immediate result of managing software vulnerabilities is the proactive reduction of risk, but there is another, often overlooked, benefit for organizations. Less cracks and holes means less noise for those who monitor environments for incidents and are responsible for responding to them. The outcome is improved accuracy, faster responses and lower cost.

    In this webinar we explain the intelligence that goes into managing software vulnerabilities, how it differs from basic information about vulnerabilities and how organizations can benefit from intelligence to become more secure.
  • Walk through Secunia's Corporate Software Inspector, CSI, 7.0 with Microsoft MVP Kent Agerlund, Coretech. Kent will walk through and review Secunia's CSI 7.0 live - while demoing the tool and answering questions. In addition he will review the System Center CnfgMngr 2012 Plug-in - the add on piece to Secunia's CSI 7 solution.
  • Dealing with the threat of cyber-attacks becomes more complex as the methods used by hackers to break into organizations and steal valuable assets become more sophisticated. Business leaders panic when hearing about the risks of advanced targeted attacks (ATA), advanced persistent threat (APT) and other acronyms.

    As fairly simple techniques are all it takes to exploit vulnerabilities, and vulnerability exploitation is behind the majority of security breaches, one of the challenges organizations face in the race against cyber-attacks is acquiring trusted information about vulnerabilities to enable security teams to define strategies to mitigate risk.

    In this webinar we will talk about the reasons why vulnerability intelligence is a critical part of an information security strategy. We will discuss how vulnerability research, and the intelligence derived from it, can help organizations improve their security posture.

    Key takeaways:

    What makes vulnerability intelligence trustworthy

    The most effective uses of vulnerability intelligence

    How to leverage vulnerability intelligence to reduce risk

Embed in website or blog