Hi [[ session.user.profile.firstName ]]
Sort by:
    • Tweet, Like and Poke Your Network into Disaster: The Dangers of Web 2.0 Apps Tweet, Like and Poke Your Network into Disaster: The Dangers of Web 2.0 Apps Corey Nachreiner, CISSP, Director of Security Strategy, WatchGuard Technologies, Inc. Recorded: Mar 15 2012 5:00 pm UTC 49 mins
    • Social networks like Facebook and Twitter pose the biggest threat to your network. But, as security professionals, we often pay more attention to interesting, flashy, and complex attack vectors - such as high-end APT attacks targeting nuclear facilities - than we do mundane, everyday attacks. However, in the past, mundane attacks, like emails with nasty attachments, accounted for the majority of actual breaches. So what's the mundane "malicious email attachment" of 2011? Two words-- Facebook links.

      Today, it's clear that the web is the most dangerous place on the Internet, and social networks are the front lines of the web battle. While the security community theorizes about the potential damage from a global cyberwar, most businesses still don't do a good job of defending against basic social network and web threats, largely because they lack the necessary security controls.

      In this webinar WatchGuard's Director of Security Strategy and CISSP, Corey Nachreiner, will describe why social networks will pose the biggest threat to your network for years to come. You'll learn attributes that make social networks like Facebook especially dangerous; how attackers leverage Web 2.0 applications to infiltrate your networks, and how real-world attackers target social networks today with attacks ranging from cyberbullying to drive-by download delivery. More importantly, Nachreiner will suggest some practical network defenses and controls that will give you back the reins to your network.

      Read more >
    • Are You Trying To Secure Web 2.0 With 1.0 Technology? Are You Trying To Secure Web 2.0 With 1.0 Technology? Tamar Shafler – Product Management, Check Point Software Technologies Recorded: Apr 18 2013 4:00 pm UTC 47 mins
    • The face of web security has changed. Securing Web 2.0 is no longer as simple as blocking an inappropriate URL or stopping a high-risk application from running. It takes an integrated approach of malware protection, URL filtering, application control, and user awareness. In this webinar, learn how the face of modern Web Security has changed and how to ensure the best, most effective Web 2.0 protection.

      Web 2.0 introduces new security risks that are very different from what we faced with Web 1.0. Just a few years ago, web content was more static, and segregated into the good and the bad when it came to malware and risky sites. Knowing the URL of corrupt sites was sufficient to protect users when they were online. Web 2.0 has brought about considerable changes – web usage has shifted from static information consumption to dynamic interaction. Facebook, Twitter, WebEx, LinkedIn - social media and internet applications have become essential business enablers. These new applications are powerful business tools, but they have caught the attention of attackers, and thus introduce new risks. Being able to protect against dangers of Web 2.0 while enabling business is key to any modern enterprise.

      Read more >
    • Controlling Web 2.0 Applications: Complete Content Protection Controlling Web 2.0 Applications: Complete Content Protection Patrick Bedwell, Vice-President of Product Marketing, Fortinet Recorded: Mar 16 2011 3:00 pm UTC 43 mins
    • New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic internal to organizations and at Internet gateways. More than ever, it’s important for businesses to deploy new methods of monitoring and controlling these Internet-based applications in order to discover and mitigate hidden security threats. Allowing employees to access Web 2.0 applications has made enforcing data security policies a far more complex problem. Patrick Bedwell, Vice-President of Product Marketing will introduce the security solution that provides complete content protection, including application detection, monitoring and control that is needed to discover threats embedded in Internet-based application traffic, and to protect against data loss resulting from inappropriate use of social media applications.

      Read more >
    • Preventing Data Leakage in a Web 2.0 World Preventing Data Leakage in a Web 2.0 World Dmitriy Ayrapetov; Network Security, Product Management, SonicWALL Recorded: Aug 5 2010 6:00 pm UTC 49 mins
    • The Web has become a bi-directional channel for communication where participation is highly encouraged. Ultimately, the benefits of Web and Enterprise 2.0 depend on it. The downside, however, is that it’s significantly easier to accidentally disclose important data – a situation that is exacerbated by the high degree of cross-over and line-blurring taking place between user’s personal and work lives. In addition, Web 2.0 technologies also make it easier to intentionally disclose sensitive information.

      Join this session to learn more about the potential for data loss through Web 2.0 applications. Discover how Application Intelligence and Control can manage this problem by supporting the development of custom signatures or rules. See how to control the flow of file types that are known to contain sensitive data in addition to other files and communication sessions detected on-the-fly to contain pieces of information that are designated as sensitive.

      Read more >
    • You had me at Web 2.0 - MARKETING IN A WEB 2.0 WORLD You had me at Web 2.0 - MARKETING IN A WEB 2.0 WORLD Jerry Hart Recorded: Mar 4 2009 7:00 pm UTC 48 mins
    • Jerry will teach you how to:
      • Master social-media-driven marketing
      • Add online B2C tactics to your B2B initiatives—and boosting response in a whole new, Web 2.0-driven way.
      • Make blogs, chats, and online buzz work for you—by including you as an authentic participant in online communities

      Social media marketing, in its many forms, has taken the business world by storm. The compelling speed, cost–effectiveness, and customer engagement benefits of social media campaigns are rewriting the rules of marketing. But so much is happening so fast that it's impossible to keep track of all the options. The good news is that you don't have to boil the ocean. Effective social media campaigns require a disciplined approach to setting strategy, choosing tools and building customer affinity. Stay focused and you'll be fine. Best practices are already emerging.

      Read more >
    • Using Web 2.0 Technologies to Generate New Business Opportunities Using Web 2.0 Technologies to Generate New Business Opportunities Gary Halliwell, CEO, NetProspex Recorded: Jul 28 2009 6:00 pm UTC 45 mins
    • This is a 2nd run of our Webinar "Using Web 2.0 Technologies to Generate New Business Opportunities" back by popular demand!

      New Web 2.0 technologies like Twitter and Facebook that were once the domains of college students and techies are now become a major focus for businesses in 2009. Through smart use of web 2.0 technologies businesses can effectively, affordably and often quickly gain new customers and prospects. In this webinar we will cover 4 technologies businesses can use to put new prospects into the sales funnel:
      1. Email marketing using purchased/targeted lists
      2. LinkedIn
      3. Twitter for lead generation (bet you didn’t know Twitter can be mined for leads!)
      4. Webcasting technologies

      We will also touch on how to use marketing and sales force automation to capture, process and turn leads into revenue.

      Read more >
    • Using Web 2.0 Technologies to Generate New Business Opportunities Using Web 2.0 Technologies to Generate New Business Opportunities Gary Halliwell, CEO, NetProspex Recorded: Jul 16 2009 6:00 pm UTC 42 mins
    • New Web 2.0 technologies like Twitter and Facebook that were once the domains of college students and techies are now become a major focus for businesses in 2009. Through smart use of web 2.0 technologies businesses can effectively, affordably and often quickly gain new customers and prospects.

      In this webinar we will cover 4 technologies businesses can use to put new prospects into the sales funnel:

      1. Email marketing using purchased/targeted lists

      2. LinkedIn

      3. Twitter for lead generation (bet you didn’t know Twitter can be mined for leads!)

      4. Webcasting technologies

      We will also touch on how to use marketing and sales force automation to capture, process and turn leads into revenue.

      Read more >
    • All In One Web 2.0 Social Media / EMarketing Sales System All In One Web 2.0 Social Media / EMarketing Sales System Kimberly Manning, CEO Emerging Group Resources Recorded: May 8 2009 4:00 pm UTC 30 mins
    • We have taken over 140 of the most effective Web 2.0 Social Media Components available on the Internet today, and we've integrated them together, into an automated turn key platform, that allows you to access and leverage any of the following Web 2.0 Social Media Tools at the "Click Of A Mouse." Here are the "No Cost" Services you can Immediately Leverage to Reduce Operating Costs and Improve Sales and Customer Growth Performance. 14 Business Cost Reduction Services, Automated Search Engine Submission Search Engine Optimization Tools, Free Press Releases, Webcasts, Business Networking Strategy, Blog Development Tools, Blog Directory Submission Automated Blog Pinging, Twitter Strategy, RSS / Atom Feeds, Unlimited Sales Leads w/ Full Contact Information, Targeted Prospect News Feeds HTML Marketing Templates, Reporting & Tracking Software, Prospecting Call Guideline
      2009 Sales Best Practices Guide Kimberly Manning - 410-464-8409 - kimberlymanning@emergingresourcegroup.com

      Read more >
    • Prospecting Web 2.0 Cold Calling Is Dead Prospecting Web 2.0 Cold Calling Is Dead Outbound Excellence - David Kalstrom Recorded: Apr 29 2009 9:00 pm UTC 30 mins
    • We have developed a Web 2.0 Social Media System that eliminates the need for cold calling. We'll walk you through each of the process: 1. A filtered spidering system that captures detailed contact information on your target prospects 2. RSS feeds that capture and retrieve news feeds related to your prospects need 3. Tracking and reporting software that attaches to all your e-documents and tracks your prospects as they view your marketing documents 4. Webcast with automated marketing, and tracking and reporting software 5. Automated 100 component viral marketing system that spreads your marketing messages through the internet at lightning speed 6. A proven strategy to get your Top 5 keywords on the front page of Google with no placement fees - David Kalstrom Outbound Excellence 877-337-2674 success@outboundexcellence.com www.outboundexcellence.com

      Read more >
    • Contextual Defenses for Web 2.0 Contextual Defenses for Web 2.0 Tom Clare, Senior Director of Product Marketing at Websense Recorded: Feb 8 2012 6:00 pm UTC 36 mins
    • Today’s ever-evolving Web and age of advanced persistent threats are spelling an end to static defenses focused on inbound known threats. In addition, surging trends such as consumer apps and cloud computing, social networking, plus mobility are redefining the perimeter and making real-time contextual defenses a requirement. Join Websense on February 8th as we discuss Contextual Defenses for Web 2.0 and offer guidance for how you can protect today’s empowered users from advanced malware while containing data theft. This webinar will discuss key requirements for defenses in the modern day including:

      · Inline real-time contextual defenses providing composite assessments

      · HTTPS/SSL traffic inspection at various levels depending on context

      · User and destination awareness by security zone, category, app or specific site

      Read more >
    • Content marketing: Thought leadership in a web 2.0 world Content marketing: Thought leadership in a web 2.0 world Stan Woods, MD of Velocity Partners Recorded: Jun 3 2009 2:30 pm UTC 34 mins
    • Content marketing is the most important thing you can do as a B2B marketer.

      You can suck at web analytics and social media. You can still think a Tweet is a bird call. But if you get Content marketing right you'll have even the most cynical sales guys bowing down to you in tribute.

      Content Marketing breaks the traditional marketing model (which boils down to shouting at your prospects across a crowded room) and erodes the barriers that buyers put up to defend themselves from your sales force. It's all about earning the right to sell.

      Cancel that meeting. Close down Facebook and Tweetdeck. Join us for a fast, furious 20 minutes on the B2B discipline that matters most.

      Read more >