Hi [[ session.user.profile.firstName ]]
Sort by:
    • Better Information Reveals Your High Risk Vulnerabilities Better Information Reveals Your High Risk Vulnerabilities Wolfgang Kandek, CTO, Qualys Recorded: Jun 4 2015 5:00 pm UTC 60 mins
    • As a security professional, information sharing with other organizations is big part of your job. However, when it comes to information about attacks and vulnerabilities, there are limited accepted resources—leaving knowledge sharing to an informal process with only a few select contacts.

      Now you can get better information about the top vulnerabilities that need your attention and what to do about them. Learn more about the US-CERT Top 30, a publication that provides guidance in the vulnerability field.

      Join this webcast for a closer look, so you can:

      > Learn about the top 30 vulnerabilities — that comprise most of targeted attacks against critical infrastructure

      > Understand how the US-CERT condenses — security data into a single report

      > Apply and implement recommendations — against your infrastructure

      > Share this new data point with your colleagues — at other companies

      Read more >
    • Is Your Vulnerability Management Program Vulnerable? (Part 2) Is Your Vulnerability Management Program Vulnerable? (Part 2) Carlos Krause, Manager of Professional Services, CISSP, CISA, MCSO Recorded: Dec 18 2014 4:30 pm UTC 59 mins
    • Is your vulnerability management program vulnerable? If you are unsure or answered “yes," sign up to join Carlos Krause, Modulo’s lead technical consultant for Part 2 of this two-part webinar series.

      In Part 1, Carlos identified key challenges and pitfalls most vulnerability management programs face. In Part 2, he will outline best practices and action items to improve your vulnerability management process, including how to:

      *Integrate your vulnerability management program with the risk and compliance actions in the organization
      *Harmonize vulnerability metrics with other programs and assessments
      *Represent risks in a business language
      *Plan and deploy a successful implementation

      Carlos Krause presented this topic at ISACA ISRM 2014 at a record-setting Megatrend Session. Due to its popularity, we wanted to bring it to you in a webinar series. Don’t miss out!

      Read more >
    • How to Mitigate the Risk of Software Vulnerabilities How to Mitigate the Risk of Software Vulnerabilities Marcelo Pereira, Product Marketing Manager at Flexera Software Recorded: Oct 29 2015 3:30 pm UTC 32 mins
    • This webinar is focused on a strategic view of risk mitigation:
      Vulnerabilities in commercial software remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or the enabler of privileges escalation inside networks.
      Despite awareness of the risk, and the fact that most software vulnerabilities have a fix the day they are made public, organizations continue to fail to execute mitigation actions. The consequence is that we continue to see costly breaches affecting businesses around the globe.
      In this webinar, Marcelo will talk about how the use of vulnerability intelligence can be a game changer to help organizations become better at mitigating the risk of software vulnerabilities.
      Key takeaways:
      -Fresh data related to software vulnerabilities
      -The challenge of prioritizing mitigation
      -How the use of vulnerability intelligence can help support consistent risk reduction

      Read more >
    • Understanding Software Vulnerabilities Understanding Software Vulnerabilities Marcelo Pereira, Product Marketing Manager at Flexera Software Recorded: Oct 20 2015 2:00 pm UTC 34 mins
    • This webinar is for business leaders who wish to understand vulnerabilities on commercial software and how they can impact organizations:
      Software vulnerabilities remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or as the enabler of privileges escalation inside networks.
      This webinar demystifies software vulnerabilities, shows how they relate to the wider ecosystem and demonstrates how this knowledge can be used to define strategies and improve security.
      Key takeaways:
      -What is a software vulnerability
      -How a software vulnerability becomes a threat
      -A glimpse of how threats multiply
      -How closing vulnerabilities impacts risk reduction

      Read more >
    • Rethinking vulnerability management: Insights from Secunia & Forrester Rethinking vulnerability management: Insights from Secunia & Forrester Kelley Mak, Researcher, Forrester Research & Santeri Kangas, CTO, Secunia Recorded: Sep 15 2015 3:00 pm UTC 61 mins
    • Cybersecurity incident disclosures and vulnerability warnings continue to be released at an alarming and fatiguing rate, and there aren’t any signs of breach activity slowing down. Vulnerability management is more important than ever, yet staying on top of vulnerabilities poses a major challenge for security and risk (S&R) professionals.

      In this webinar, guest speaker, Forrester Research’s Kelley Mak, will provide insight on how S&R pros can repair their strained or broken vulnerability management processes and move past low impact checkbox scanning to proactive, risk-based assessments.

      Following Kelley Mak’s presentation on the changes in vulnerability management, Secunia’s CTO Santeri Kangas will present Secunia’s take on the challenges of vulnerability management and how the Secunia VIM, our Vulnerability Intelligence Manager, helps organizations address those challenges.

      Read more >
    • Improving on "Whack-a-Mole" Vulnerability Management Improving on "Whack-a-Mole" Vulnerability Management Joseph Blankenship Senior Analyst, Forrester & Jimmy Graham Director, Product Management, Qualys Recorded: Aug 18 2016 6:00 pm UTC 50 mins
    • The need to prioritize vulnerability management (VM) is greater than ever as IT security teams become overwhelmed with trying to protect against every threat that pops up. Organizations that understand the varying risks across vulnerabilities can focus on resolving dangerous exploitation, and avoid wasting crucial time addressing insignificant ones.

      We invite you to attend the “Improving on 'Whack-a-Mole' Vulnerability Management” webcast featuring guest speaker Joseph Blankenship, Senior Analyst at Forrester, and Jimmy Graham, Director of Product Management at Qualys.

      The following topics will be discussed during the webcast:

      * Forrester data trends and insights from real-world client scenarios

      * Why vulnerability management needs to be prioritized and elevated

      * How Qualys ThreatPROTECT shows you what to remediate first (led by Qualys)


      This webcast includes a live Q&A.

      Read more >
    • All About the Thousands of 2014 Vulnerabilities - From Secunia Research All About the Thousands of 2014 Vulnerabilities - From Secunia Research Kasper Lindgaard, Director of Research and Security, Secunia Recorded: Apr 14 2015 3:00 pm UTC 43 mins
    • Every year, Secunia Research releases a review of the global vulnerability landscape, based on their large vulnerability database and data from the Secunia Personal Software Inspector (PSI) user base.

      The data in this research provides security professionals around the world with perspective on the impact and evolution of the threat landscape and what has trended throughout the year.

      In this webinar, Secunia’s Director of Research and Security Kasper Lindgaard will discuss the data presented in the Secunia Vulnerability Review 2015 and answer questions.

      The review itself was released on March 25.

      You can download a copy of the review on our website:

      www.secunia.com/VR2015

      Key takeaways:

      - The number of vulnerabilities and zero-days detected in 2014

      - How quick vendors are to respond to vulnerabilities

      - Which programs are more vulnerable

      - How products bundled with open source applications and libraries affect security

      Read more >
    • Prioritize and Remediate your Vulnerabilities with Qualys ThreatPROTECT Prioritize and Remediate your Vulnerabilities with Qualys ThreatPROTECT Wolfgang Kandek, CTO, Qualys and Tim White Director, Product Management, Qualys Recorded: Jun 23 2016 6:00 pm UTC 61 mins
    • Dealing with a large number of IT vulnerabilities is an issue for most organizations. Only 10 Common Vulnerabilities and Exposures (CVEs) account for 97% of the exploits*. Clearly, it is vital for you to identify which of your vulnerabilities are the most critical to address first with fast, effective remediation.

      Qualys’ newest solution ThreatPROTECT correlates vulnerability data with a Live Threat Intelligence Feed from multiple industry sources, providing customers with an easy-to-understand dashboard that provides clear insight into which vulnerabilities to fix first.

      During this webcast presenters Wolfgang Kandek, and Tim White, will show you how you can use ThreatPROTECT to:

      * Quickly identify your most important assets and critical vulnerabilities

      * Prioritize remediation efforts so you know which vulnerabilities to tackle first

      * Eliminate the guesswork with real-time correlation of active threats

      This webcast includes a live demo and a Q&A.

      Read more >
    • PCI and Vulnerability Assessments - What’s Missing? PCI and Vulnerability Assessments - What’s Missing? Mike Pittenger, VP of Security Strategy, Black Duck Recorded: May 4 2016 3:00 pm UTC 36 mins
    • All regulatory requirements (HIPAA, PCI, etc.) include a mandate for assessing vulnerabilities in systems that manage or store sensitive data. Organizations often opt to conduct vulnerability assessments on an annual, quarterly, or even monthly basis. But while vulnerability assessment tools can identify unpatched or misconfigured code bases, these tools overlook a large portion of an organization’s attack surface: known vulnerabilities in applications that are built in-house. These applications will not have public updates, nor will the thousands of open source components they utilize be included in public disclosures. This is concerning because over 6,000 vulnerabilities in open source projects have been reported since 2014. Register for this webinar to discover how to protect yourself.

      Read more >
    • Focus: Software Vulnerability Management Focus: Software Vulnerability Management Marcelo Pereira, Business Development and Analyst Relations, Secunia Recorded: Oct 14 2014 2:00 pm UTC 36 mins
    • RISK.

      Managing risk must start with reducing the cracks and holes through which unwelcome visitors can gain access to any valuables you want to protect.

      Software vulnerabilities are often the entry points used by cybercriminals to get into organizations and escalate attacks. For that reason, having a comprehensive overview and accurate information on software vulnerabilities is one of the critical factors to assess risk and prioritize the actions that will have a strong and consistent impact on reducing the attack surface.

      The immediate result of managing software vulnerabilities is the proactive reduction of risk, but there is another, often overlooked, benefit for organizations. Less cracks and holes means less noise for those who monitor environments for incidents and are responsible for responding to them. The outcome is improved accuracy, faster responses and lower cost.

      In this webinar we explain the intelligence that goes into managing software vulnerabilities, how it differs from basic information about vulnerabilities and how organizations can benefit from intelligence to become more secure.

      Read more >
    • Overwhelmed by Security Vulnerabilities? Learn How to Prioritize Remediation Overwhelmed by Security Vulnerabilities? Learn How to Prioritize Remediation Deb J, SME & Solution Architect – APAC & Middle East, Qualys Inc. Recorded: Sep 14 2016 6:00 am UTC 63 mins
    • One of the biggest challenges faced by information security teams today is how to effectively prioritize their vulnerability remediation work. Burdened with this overload of vulnerability disclosures, Infosec teams often get overwhelmed by the task at hand and throw up their hands in frustration. After all, no IT department has enough staff and resources to promptly patch every single vulnerability within their environment.

      Join Qualys and (ISC)² on Sept 14 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefing on how to prioritize remediation.

      Presenter: Deb J, SME & Solution Architect – APAC & Middle east, Qualys
      Bios:
      Deb J (DJ) works with Qualys as a Subject Matter Expert for all products and platforms at Qualys. He is also a Field Solution architect responsible for customer success in the region. Deb has over 12 years of experience of which a large amount of time was spent on security. Started his career as a Code Quality Governance Specialist, so attention to details comes naturally. In the past he has worked with Compuware, NetIQ, LogLogic & ArcSight that adds a lot of experience for him to understand customer problems and identify solutions that work for them.

      Read more >
    • Compelling Reasons to use Vulnerability Intelligence Compelling Reasons to use Vulnerability Intelligence Marcelo Pereira, Business Development and Analyst Relations at Secunia Recorded: Aug 12 2014 2:00 pm UTC 34 mins
    • Dealing with the threat of cyber-attacks becomes more complex as the methods used by hackers to break into organizations and steal valuable assets become more sophisticated. Business leaders panic when hearing about the risks of advanced targeted attacks (ATA), advanced persistent threat (APT) and other acronyms.

      As fairly simple techniques are all it takes to exploit vulnerabilities, and vulnerability exploitation is behind the majority of security breaches, one of the challenges organizations face in the race against cyber-attacks is acquiring trusted information about vulnerabilities to enable security teams to define strategies to mitigate risk.

      In this webinar we will talk about the reasons why vulnerability intelligence is a critical part of an information security strategy. We will discuss how vulnerability research, and the intelligence derived from it, can help organizations improve their security posture.

      Key takeaways:

      What makes vulnerability intelligence trustworthy

      The most effective uses of vulnerability intelligence

      How to leverage vulnerability intelligence to reduce risk

      Read more >