WEBCAST:
Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
WEBCAST:
Animation that shows how enterprise APIs can be managed using AWS hosted API management infrastructure that allows you to scale security along with apps in the cloud. Learn how public cloud apps can be quickly secured and expose for rapid mobile access. Learn about API management from the AWS cloud.
WEBCAST:
Cloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.
WEBCAST:
This informative webcast explores the challenges of vulnerability management and creative solutions to help you fully leverage your vulnerability management process and reduce your patch cycle.
WEBCAST:
Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.
WEBCAST:
This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security.
WEBCAST:
Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
WEBCAST:
Straight from the IT battleground, gain expert insight on how to effectively and immediately containerize your enterprise data. Learn the importance of mobile security within these applications and what you can do immediately to ensure that your enterprise data is as efficient and actionable as possible.
Posted: 01 Nov 2013 | Premiered: Nov 14, 2013, 13:00 EST (18:00 GMT)
WEBCAST:
This exclusive webcast examines a security solution designed to help you manage privileged identity access and centrally manage, audit and control shared identities across the enterprise to help prevent internal incidents from occurring.
VIRTUAL ENVIRONMENT:
The difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.