Sign up for our weekly newsletter!
Webinar Archives
Webinars are free sponsored educational seminars that are accessed over the Internet. You can register for upcoming Webinars or view archived presentations via the links below.
Making the Case for a DevSecOps Transformation
Date: 4/26/2018
View archived webinar

The explosive growth of public cloud and DevOps adoption has transformed how businesses deliver products and services to their customers. The quickening pace of business agility, coupled with innovative new cloud technologies and the negative press of high-profile cloud data breaches, has ratcheted up the pressure on development, IT operations and IT security. Join us for this webinar where Roy Illsley of Ovum and Rick Bosworth of BMC will share how you can enable DevSecOps in your organization.

Attend this webinar to:

  • Explore the current state of the DevOps market
  • Discover the benefits of integrating security into the software development process
  • Establish the groundwork for a successful DevSecOps transformation

CASBs: A Primer on Securing Your Cloud Environment
Date: 3/29/2018
View archived webinar

Rapid proliferation of cloud services has turned the security landscape on its head. Where firewalls and device management solutions were once enough to protect corporate data, today enterprises must contend with access from unmanaged BYO devices, file sync and share platforms, and new workflows. Traditional security solutions are ill equipped to protect data in this new cloud- and mobile-first environment.

Changes in corporate infrastructure have necessitated a change in approach to security, one that is more focused on data protection across multiple applications. Join Ovum analyst Rik Turner and Bitglass VP of Product Management Mike Schuricht as they explore the challenges of migrating to cloud and widely used solutions like cloud access security brokers (CASBs) that have emerged to solve these challenges.

SD-WAN Security Best Practices: How to Achieve Security and Performance SLAs for Cloud Applications
Date: 3/22/2018
View archived webinar

In today's cloud-centric world, global enterprises are considering SD-WAN solutions that offer reliable connectivity, fast application performance, and best-in-class security, without adding network complexity and extra costs. Join Brian Tokuyoshi, Sr. Product Marketing Manager at Palo Alto Networks, and Randy Barr, Chief Security Officer at Aryaka, to learn how global businesses benefit from a global SD-WAN combined with cloud-based security to improve application performance and protect mission-critical data.

In this webinar, you will learn:

  • The main challenges in protecting mission-critical applications for the global enterprise
  • The importance of deploying multiple layers of security to protect business-critical data
  • Integration best practices that provide global enterprises with enhanced security infrastructure and fast application performance

A Look Ahead to Security in 2018
Date: 12/19/2017
View archived webinar

This year has been a notable one in IT security. From ransomware to large-scale data theft, criminals and nation-state actors have taken a toll on business and government. While everyone takes a deep breath after surviving the year, there is huge concern about what lies ahead.

In this Security Now end-of-year webinar, we look at the major events and trends of 2017 and see where those trends are likely to lead in 2018. Will ransomware become more pervasive? Will DDoS attacks get bigger and more common? Is a military-grade attack on a national economy lurking in the background? We'll look at all these and more in an hour filled with information and predictions to help inform your action plans and buying decisions.

Join Security Now editor Curtis Franklin and Enterprise Cloud News editor Scott Ferguson as they look at the events of 2017 and talk about how those events are likely to work into trends for 2018. Along the way they'll wrap together predictions from experts around the industry to share the "consensus view" on what information security will look like in the coming year.

You'll also have a chance to voice your opinion in several webinar polls – and the question, answer and comment session that's a crucial part of every Security Now webinar. Join us for this look ahead at information security in the coming year and end 2017 on a productive note!

Microsegmentation: A Better Way to Protect Application Workloads & Secure Data
Date: 11/30/2017
View archived webinar

Microsegmentation allows IT and developers a way to decouple security policies from the restraints of physical hardware. By embedding security policies directly into the virtualization layer -- within the hypervisor itself -- microsegmentation offers a much more efficient and practical way to secure workloads. Many enterprise applications still run on legacy machines and non-virtualized bare-metal servers, and sometimes contain the most sensitive data a company can have. Keeping these apps more segregated by limiting the amount of traffic traveling between apps can ensure that someone snooping on a network cannot access the data of an enterprise's most important legacy application. Ideally, customers want a single unified policy and enforcement mechanism that is extensible and portable, for their entire compute estate running on legacy systems, bare-metal servers, virtualized hosts and cloud workloads. Microsegmentation allows customers to achieve this goal and eliminates many of the most vulnerable spots in the application chain.

Agility, Scalability & Automation – Enabling Digital Transformation Through the ADC
Date: 10/12/2017
View archived webinar

Companies are changing the way business is done through digital transformation to gain a competitive advantage. Effectively, they are utilizing IT innovation to incorporate agility, scalability, and automation to enable services to be delivered digitally through the internet. The application delivery controller (ADC) plays a vital role in this transition, since it supports critical network capabilities necessary for transforming the manner in which companies conduct business in the modern internet age.

Accordingly, this webinar will focus on the role of ADCs and how they enable digital transformation through:

  • Agility – Create a flexible network framework to move, add, and update applications quickly and easily
  • Scalability – Pool resources within and across datacenters and clouds to deliver real-time on-demand resourcing
  • Automation – Integrate policies and tools to automate manual processes to create error-free processes quickly and easily.

Latest Articles
In a pair of papers released over the last week, researchers have shown how two different types of attacks, Throwhammer and Nethhammer, can cause a bit flip in chips by sending packets across a standard network.
This week marked the one-year anniversary of the WannaCry ransomware attacks and its impact can still be seen in the form of such encrypting malware as NotPetya, BadRabbit and Olympic Destroyer.
Talk about overreacting. After researchers claimed to have found some flaws in PGP, the industry lost its collective mind. Here's what is really happening.
They may be stupidly named but they are essential for protecting enterprise assets that span on-premises servers, IaaS and PaaS clouds, as well as virtual machines.
The proposal from two security researchers at the University of North Carolina would entail creating a protocol that would enable websites and service providers to block attempts by individuals trying to use the same password for multiple sites.
Information Resources
upcoming Webinars
Cloud Access Security Brokers in the Wild
Wednesday, May 30, 2018
1:00 p.m. EST / 10:00 a.m. PST
Flash Poll
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2018 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with