The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
You have all the tools and security professionals but can't answer a simple question: Am I safe? Join us for the webinar where we discuss what is a SOC? Where do you start? How to get value from SOC-as-a-Service in 60 min?
Attackers are getting more targeted and advanced, deploying unknown exploits and unique malware that current day endpoint security is not equipped to prevent or even detect. Existing approaches simply can’t protect against these attacks because they don’t have known signatures, known strings –and in many cases, no previously known behavior-so they go straight through, resulting in compromised endpoints waiting for detection and remediation to step in, which is too little too late.
Palo Alto Networks Advanced Endpoint Protection is a complete paradigm shift from detection remediation to pure prevention, designed to close the door on these threats, which manage to evade detection by network-based security or take advantage of blind spots, well before any damage can be done.
Join Palo Alto Networks® for a Live Webinar to learn about the breakthrough advanced endpoint technology that redefines endpoint security as we know it
Join us for a live demo and learn how AutoFocus threat intelligence service helps security teams identify and prevent targeted attacks. We will explain the key concepts of AutoFocus and benefits the service provides.
Securing public cloud environments has never been more challenging. Cyberattacks are on the rise, targeting your business-critical data using applications commonly found on every network. Compounding your data security challenge is the lack of application visibility and control features available in existing cloud security offerings.
The VM-Series for AWS addresses these challenges with a complete set of next-generation firewall and advanced threat prevention features that allow you to identify and control your AWS-based applications and protect your data from known and unknown threats.
The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.
Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:
•Gain visibility and granular, context-based control of SaaS applications.
•Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
•Protect against new insertion and distribution points for malware.
•Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.
The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
You need 100% data access and visibility, and the intelligence to evaluate vast volumes of network traffic, without slowing or disrupting your network. A resilient security fabric does all this and helps scale your security infrastructure as needs change.
Open Banking is set to disrupt the financial services value chain. Across the world, this disruption can already be seen with a number of innovative initiatives emerging and with pressure from regulation, such as PSD2 in Europe, beginning to impact institutes.
With the foundations starting to build, what are the common approaches to Open Banking and how can you avoid the pitfalls?
Hear from MuleSoft Banking API specialist Danny Healy and industry veteran Paul Rohan, author of "PSD2 in Plain English", for a unique business and technical insight from the leaders in API-led connectivity.
Will you simply survive? Or change to thrive, in an Open Banking world?
Your security architecture was designed to protect your business, but does it have the resiliency to deliver results in the event something doesn’t go as planned? Resiliency is attainable – even on a budget – when you take it step by step.
Help protect your organization's data and applications. Even a minor outage can put you at a competitive disadvantage
Mitigate your risk and be ready with a business continuity plan that enables backup and disaster recovery if needed. Increase capacity, decrease costs, and delivery disaster recovery at cloud scale.
Join this webcast to learn how to:
- Implement disaster recovery for all your major IT systems
- Unify data management, security, and protection
- Provide protection for your data and applications, no matter where they reside
- Extend on-premises backups storage and data archiving solutions to the cloud
This webcast is part of our Why and how to move to the cloud webcast series. Sign up for this session, or the entire series today!
The capabilities of SaaS solutions integrated with public clouds is here today. Most SaaS solutions however don’t integrate with public clouds and have to be purchased directly from the SaaS companies, which is a real inconvenience to cloud customers. When customers have to visit two different interfaces to manage their SaaS solution and their public cloud deployments, it can be an operational burden.
Website security and DDoS mitigation cloud solutions are increasingly more effective against DDoS attacks, which are getting bigger and bigger. There are a number of reasons for this which we will cover, including limitations of VM-based solutions, better coverage for both public cloud deployment, and hybrid/legacy deployments with the same solution.
In the webinar we will explain how Incapsula cloud services and Microsoft Azure worked together to bring a leading cloud security solution to Azure marketplace thus building a model that other SaaS companies can replicate.
Akamai sees more than 2 trillion Internet interactions every day and mitigates 40 – 50 DDoS attacks every month. Our security experts analyse this information and share trends, observations, and findings in the quarterly State of the Internet Security report.
Join Jay Coley, Senior Director, Enterprise Security Architecture at Akamai Technologies for an overview of what we found after analysing data from Q3 of 2016.
Key topics covered will include:
· Why DDoS of over 100 Mbps increased over the past quarter
· Which country is the new leader for most sourced Web application attacks
· Tactics Akamai used to mitigate two of the largest DDoS attacks we’ve seen
Despite the rise of the cloud and increased reliance on web applications, native desktop applications are still highly relevant and often the delivery method of choice in enterprise IT. As penetration testers, we still see a number of very poorly architected native applications being used to protect extremely sensitive information.
This webcast will discuss some of the core issues relating to native desktop applications, why they are so frequent, and the severe impact that their insecurity can cause.
In the 2017 threat landscape, we propose that these flaws are not going away, and the industry isn't currently in a position to help developers resolve them effectively.
The pace and scale of information security threats continues to accelerate, endangering the integrity of trusted organisations. Although cyberspace offers opportunities for leading organisations, this environment is uncertain and potentially dangerous. It is a place where hacktivists and cybercriminals are honing their skills and governments are introducing new regulation and legislation in response to major incidents and public concerns. Organisations are forced to continually adapt and rapidly respond.
In this webinar, Steve Durbin Managing Director at the ISF, will discuss the rapidly changing threat landscape, identify the key cyber challenges for 2017 and suggest ways of managing the associated risks.
Digital transformation affects every industry, every type of organisation and every country in Europe. It is a strategic priority for businesses to address the top drivers behind industry change: (1) changing needs of customers; (2) new distribution channels; and (3) new products entering the industry.
A unified suite of applications running off of a single database answers these challenges efficiently, and Frost & Sullivan research finds that businesses increasingly see cloud as a solution to the challenges of industry transformation, competition, and as a means to facilitate global expansion. They are turning to the cloud for its agility, scalability and flexibility, and reaping the rewards by delivering innovative products and services that are transforming industries.
Advances in artificial intelligence are leading to developments in cyber-attack technology, making threats faster and more sophisticated than ever. From smart ransomware through to sophisticated, customized malwares that blend into the network, security teams are struggling to keep up with the new generation of threats. In this cyber arms race, a new approach is needed to identify and respond to AI attacks and other subtle, advanced adversaries. During this webinar, Darktrace’s Director of Technology, Dave Palmer, will examine this challenge and explain why immune system technology, powered by unsupervised machine learning, will be critical in the future of cyber defense.
Join this engaging session as BrightTALK conducts an in-depth interview with Ian Glover, President of CREST.
It's been a crucial year for cyber security with big breaches and newsworthy hacks. BrightTALK's Information Security Community Manager Josh Downs will be quizzing Ian for his thoughts on the cyber security industry and in particular:
- The big breaches of 2016 and lessons to be learnt
- The current threatscape
- The big vulnerabilities on the horizon
- Ian's insights into how to keep your company secure in 2017
We look forward to you joining us for the session.
Most security programs are understaffed and overwhelmed with alerts, often defined by processes that rely on manual intervention and containment. They must keep pace with attackers who have access to intellectual resources, computing power and the backbone of the fastest digital delivery networks.
Security orchestration levels the battlefield by bringing together disparate technologies and incident handling processes into a single console and facilitates processes with automation. The goal is to improve response time, reduce risk exposure and maintain consistent security processes.
Join this webinar with Paul Nguyen, VP of Orchestration and Integration at FireEye and guest speaker Joseph Blankenship of Forrester to learn what orchestration really is, how to use it, and how to recognize a quality orchestration solution. You’ll discover:
•Why we are seeing a rise in security orchestration
•Where the market is movingHow to get the most out of orchestration
•Which orchestration capabilities are essential and which are differentiators
•What drivers and functional capabilities will define the market
•How to best evaluate and deploy orchestration solutions
Register today for the latest on orchestration from FireEye and Forrester experts.
During our next customer webinar, we’ll share expert tips and best practices on how to extract maximum value from the latest features available in Black Duck Hub. The new integrations and features help improve both open source security and compliance. You’ll learn how to:
•Track remediation tasks using the new Hub-Jira integration
•Leverage new open source discovery techniques for Ruby Gems and Node.js as well as build integrations for Maven/Gradle to improve the accuracy of your open source inventory
•Customize your notices file so that all open source is properly attributed
•Leverage the new Hub-Email Extension to push notifications via email
•Incorporate Hub scanning into your Jenkins pipeline projects