Enterprises that use SAP and run business-critical applications such as ERP, HCM and SCM, have been identified to have significant gaps in security. When speaking to companies using SAP we find that they have uncoordinated security and compliance processes, lack visibility into SAP infrastructure and think that they are covered with outdated security measures such […]
In this webcast you’ll hear penetration testers’ stories from the trenches. You’ll learn how social engineering, web application testing, brute force password guessing and other tactics come together for fascinating stories, detailing how networks are breached.
In this webcast, we’ll compare application data stored on both Android and iOS Devices. Both Android and iOS devices rely upon SQLite database files to store application data within the handsets memory.
Several folks have asked us for the materials from our webcast titled “Building A Security Program From The Ground Up: Crawl, Walk, Run!” So, here ya go! Enjoy! Sildes: Building A Security Program From The Ground Up: Crawl, Walk, Run! from Security Weekly
When: Tue, Jan 28, 2014 1:00 PM – 2:00 PM EST Build A Security Program From The Ground Up: Crawl, Walk, Run, When auditors ask for details regarding change control, vulnerability management programs, patch cycles and system hardening guidelines, is it uncomfortable? Do you cringe when customers and partners as for your security policies and […]
When: Tue, Jan 21, 2014 12:01 PM – 1:31 PM MST The Devil You Know, Dave Kennedy will be testifying on vulnerabilities discovered in the healthcare.gov site this Thursday. We have seen the vulnerabilities Dave will be testifying on, and they are quite serious. But the bigger issue is this is not localized to just […]
Topic The vast majority of cyber attacks do not use advanced malware. Rather, attackers use whatever they need to do the job. In this webcast, John Strand and Paul Asadoorian discuss the three most common tools used by attackers to gain access to a system. Attendees will understand that smart security professionals will use the […]