The global price tag of consumer cybercrime is estimated to be some 133BN USD (97BN EUR) annually (which is enough to host the 2012 London Olympics nearly 10 times over) and impacts 12 victims per second every single day. But how do hackers crack a corporation and individuals?
The weak link could be you and your employees…Join Symantec
Website Security Solutions to understand the threat landscape, the implications and how you can take proactive steps to protect yourself and your organisation.
RecordedDec 3 201342 mins
Your place is confirmed, we'll send you email reminders
Ben Herzberg, Head of Security Response at Imperva Incapsula and Akhil Verma, Product Marketing Website Security at Symantec
The latest DDoS Threat Report from Imperva Incapsula shows that DDoS attacks continue to grow in size with a significant increase in network layer attacks. With the scale and reach of DDoS threats increasing, enterprises need to be vigilant to protect their assets and customer data. Join our webinar to learn how you can protect your enterprise from global cybersecurity threats.
At the webinar you’ll learn:
• Insights into global DDoS attack patterns
• Best cyber security practices
• How to harden your current security practices
• How to build a scalable cyber security strategy
ECC ist der modernste Verschlüsselungsalgorithmus, der beim Schlüsselaustausch und der Authentifizierung mit den Protokollen SSL und TLS zum Einsatz kommt.
ECC wird RSA voraussichtlich ablösen, da der explosionsartige Anstieg der Mobilgerätenutzung und der Kommunikation zwischen Maschinen (M2M) sowie die Entwicklung des Internet der Dinge die Grenzen der Skalierbarkeit des derzeitigen Standardalgorithmus RSA übersteigen.
Die Zuverlässigkeit und Leistung von ECC sind inzwischen klar erwiesen. Die größte Hürde für den Einsatz des Algorithmus ist mangelnde Kompatibilität mit vorhandener Technik. Deshalb hat Symantec Hybrid-SSL-Zertifikate mit ECC und RSA entwickelt. Mit diesen Zertifikaten können Sie Ihre bisherigen Infrastrukturinvestitionen weiterhin nutzen und gleichzeitig Kompatibilitätsprobleme vermeiden.
In diesem Webcast erfahren Sie,
welche Vorteile ECC in puncto Sicherheit, Zuverlässigkeit und Kapazität bietet,
wie die Zertifikatskette eines Hybrid-SSL-Zertifikats mit ECC und RSA aussieht und
wie Sie ein solches Zertifikat beantragen.
ECC is the latest encryption algorithm used for key exchange and authentication purposes in the SSL/TLS protocols.
ECC is expected to replace RSA (current standard) as the scalability of RSA has become too limited to deal with the explosion of the number of mobile devices, machine-to-machine (M2M) communications and the development of the IoT (internet of the things).
The reliability and performance of ECC no longer needs to be demonstrated. However, a significant obstacle to the adoption of ECC lies on the lack of compatibility for such algorithm. This is why we have created ECC/RSA hybrid SSL certificates, allowing you to protect your current infrastructure investment while mitigating potential compatibility issues at the same time.
Join us in this webcast and find out:
-what are the main benefits of ECC in terms of strength, reliability and capacity
-how ECC/RSA hybrid certificate chains work
-what is the enrolment process
Présent sur un grand nombre de certificats SSL, l'algorithme SHA-1 est aujourd'hui en proie aux compromissions par des cybercriminels. Face à ce danger, Google, Mozilla et Microsoft ont annoncé la fin prochaine de la prise en charge du SHA-1 dans leurs navigateurs, qui se traduira par l'affichage de messages d'avertissement en présence de cet algorithme.
Avec Symantec, vous pouvez d'ores et déjà remplacer vos certificats actuels par des certificats SHA-2 plus résistants pour votre site Web. Profitez de notre webinaire pour faire un point complet. Au programme :
Les dates clés du remplacement de vos certificats SHA-1
Comment obtenir des certificats SHA-2 sans aucun coût supplémentaire
Le processus de remplacement de votre certificat
Vous découvrirez également comment Symantec vous aide à garder un coup d'avance pour protéger votre entreprise contre les cybermenaces.
Everything you need to know about website security and online threats
Symantec Website Security Solutions take SSL protection and trust to a whole new level. Secure your website, increase customers' confidence, and reach the full online potential of your business. You can learn about the threat landscape and Symantec product updates by subscribing to this channel.
The only thing that is constant is change. As we face a change in the administration and possible changes in the SES framework, it is important to realize that change can bring about creativity and innovation. Join us for this viewcast as we explore some the potential changes that are unique to federal government agencies, and examine organizations that, despite the negative impacts of change, reinvented themselves or their processes to meeting increasing demands.
As organizations compete for the same consumers, many companies are turning to live-streaming video content to better engage their online audience. But to deliver the live streaming experience viewers expect, organizations need a technical plan that will support successful live-streaming to viewers around the globe on any device.
Whether you are delivering live-streaming events now or are looking to add them to your existing VOD workflow, join us for this live webinar where our expert will outline key considerations for delivering live-streaming video to ensure the highest Quality of Experience for viewers.
This webinar will cover:
• Advanced planning you must do before live-streaming events
• Execution pitfalls to avoid
• Designing an efficient workflow
• Delivering to a diversity of devices
• Protecting your content from unauthorized access or theft
In the borderless world of Cloud computing, everything changes from anywhere access to anything as-a-service. While organizations are keen to reap the benefits the cloud offers, many fall shy of adoption for two reasons: security and control. Cloud computing imposes significant security risks on the corporation, network, IT and the day to day activities of the business. How do organizations maintain compliance, control and ownership of sensitive data as they move from the physical environment to a cloud world when the distribution of data may not be completely controlled by the data owner, and there is liability confusion as cloud service providers take on a larger role? Join HPE Security - Data Security and (ISC)2 on June 28, 2016 at 1:00PM Eastern for Part 1 of a 3 part Security Briefings series examining the key security challenges faced when moving to the Cloud.
Financial firms of all shapes and sizes are facing advanced threats on a daily basis – rarely a day goes by without seeing another headline about a cyberattack or data breach. Cybercriminals are going after the most sensitive data knowing how and where to find it.
With compliance standards and audit regulations becoming more stringent, and the rising prevalence of cyber threats, the need to protect vulnerable critical information has never been more important. During this webinar, CounterTack and Proficio will discuss the growing need for financial institutions to have next-generation endpoint security solutions combined with 24x7 security monitoring and alerting.
During this session you learn:
• Why endpoints have become the focus for attackers
• What you can do to secure endpoints in today’s threat landscape
• Best practices for meeting security regulation and compliance standards
• The role of security monitoring and alerting in keeping critical assets safe
Las presiones de seguridad continúan aumentando – hoy más que nunca. Sabemos que probablemente usted esté bajo estrés, no satisfecho, y bajo ataques. Trustwave encuesto a 1.414 profesionales de seguridad informática para entender los factores emocionales que contribuyen a sus dolores de cabeza y desafíos. Súmate a aprender como aliviar esos puntos de dolor y escaparle a la presión.
Durante este webinar compartiremos resultados del 2016 Security Pressures Report e incluiremos:
• ¿Los profesionales de seguridad sienten que tienen suficientes habilidades y personal?
• ¿Cómo han cambiado año a año las presiones de seguridad en general?
• ¿Cuáles son algunas recomendaciones prácticas que puedes implementar en tu organización para reducir la presión?
Random numbers are the lifeblood of crypto but are often taken for granted. Poor randomness makes keys more predictable and weakens security. Getting random number generation right is already a challenge, and in the virtualized world of cloud computing and constrained devices of the IoT, the situation is likely to get worse.
Join our live webinar to learn how you can easily upgrade your systems to take the uncertainty out of random number generation.
*Assess your current systems – learn why random numbers are so critical, how they are generated and if you can prove that everything is working
*Learn about ways to generate entropy, improve random numbers and test for compliance
*Deploy solutions to strengthen your data center and distributed applications without expensive changes or operational burden
Over the last decade, cyber security has evolved from a niche concern confined to IT professionals to a major priority for CEOs and boards of directors. Company leaders are now charged with managing cyber risk with the same urgency that they have managed traditional business risk.
The emergence of cyber risk as a centerpiece of risk management is being fueled by new and increasingly complex threats. Organizations must deal with a quickly evolving set of threats to their information systems and data. Many of these threats were unimaginable just a few years ago.
In this discussion, we explain the different forms of cyber risk and show how the threat level has risen in recent years. We also provide a basic framework for managing cyber risk, and finally, we pose five key questions business leaders should ask themselves to ensure their security posture is sufficiently robust and resilient to meet evolving threats.
Register for this webinar today. As usual, we’ll leave time for Q&A.
Your identity and governance practices are well established, but they might not be as comprehensive as they need to be. Going beyond the basics is critical to greatly reduce security risk and improve efficiencies.
Join CA Technologies security expert, John Hawley, to examine how to broaden the scope of governance to include privileged users, contractors, and business partners, as well as controlling access to physical assets. You’ll also learn the important role of identity performance analytics in a governance deployment.
Excited about the new Windows 10 features? We are, too! Join this session to learn about how Microsoft Intune and System Center Configuration Manager are going to support and enhance new features in Windows 10 that unlock new scenarios and management options which weren't previously possible. Plus, explore improvements for deployment and upgrade in System Center Configuration Manager, Microsoft Intune, and Windows 10. Learn how Microsoft is gearing up to make the deployment and upgrade of Windows 10 using Configuration Manager or Intune the easiest yet.
Discover the Anatomy of Multivendor Security Orchestration
Multivendor integration can improve operational efficiencies, accelerate threat response, boost security ROI and greatly improve a company’s network security and compliance posture. In this webinar, Ms. Geisler breaks down the anatomy of security orchestration. In addition, you’ll learn how ForeScout is extending the visibility and control capabilities of ForeScout CounterACT® to its partners’ security management products, as well as:
- The role ForeScout ControlFabric® Architecture and ForeScout Extended Modules play in achieving rapid security orchestration
- Real-world security orchestration use cases
- Specific examples of how ForeScout helps leading security management vendors share information and automate security workflows and response
Jennifer Geisler , Vice President of Marketing, ForeScout Technologies
With 20 years of industry experience, Jennifer drives ForeScout’s corporate branding, content marketing and sales enablement initiatives. Prior to joining ForeScout, Jennifer held senior marketing positions at Packeteer (acquired by Blue Coat Systems), Cisco and Intel Security. Jennifer holds a bachelor’s degree in business from Wright State University.