Sign up for our weekly newsletter!
REGISTER NOW
Upcoming Webinars
Webinars are free sponsored educational seminars that are accessed over the Internet. You can register for upcoming Webinars or view archived presentations via the links below.
Increase Operational Efficiency with Security Automation
Date: 3/28/2019 11:00 am New York / 3:00 pm London
More information and registration

Ask anyone and youíll hear that most security teams today are facing the same issues: increasing attacks, the expanding security talent shortage, and a seemingly insurmountable volume of data. If this sounds like you (or your CISO), itís time to give security orchestration and automation a serious look.

Join us in this webinar to learn how automation can help you evolve your security strategy for the challenges you face today (and tomorrow). By augmenting your capabilities and integrating into your existing tech stack, youíll increase your teamís efficiency and level-up your security program to improve your overall security posture.

Avoiding the Security Pitfalls of SD-WAN and Network Modernization
Date: 4/9/2019 11:00 am New York / 4:00 pm London
Sponsors:
OPaQ
More information and registration

Companies of all sizes are modernizing their networks to meet todayís business demands. These networks need to be increasingly high-performance, cost-effective, and flexible. The benefits of SD-WAN are indisputable. However, security is the top network concern for companies Ė and for good reason -- security needs to keep pace with the changing network. Many network modernization solutions such as SD-WAN are creating critical security vulnerabilities that must be addressed. By attending this webcast, you will:

  • Understand what top security vulnerabilities are plaguing companies as they modernize their networks
  • Learn how critical security vulnerabilities can be easily addressed with security-as-a-service
  • See how cloud and automation are enabling companies to simplify their ability to modernize their networks and security

Latest Articles
It's an internal matter – but it could affect millions of the social network's users.
The FIN7 group of cyber criminals is still going strong.
Radio silence after reports of a headline-snagging ransomware payment in Jackson County, Ga., presents a possible case study in the pros and cons of paying ransomware attackers.
IBM's X-Force has found that intertwined relationships exist between the Trickbot, Gozi, Ramnit and IcedID malware families – and that spells trouble.
The findings from Positive Technologies aren't that, erm, positive.
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2019 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with