We discuss the significance of PCI Compliance in your business, the top 10 changes in 3.1 that will affect your application security program, and provide recommended activities to achieve compliance.
With attackers gaining traction, we will take a deeper dive into how to defend against cross-site scripting (XSS) attacks. You will learn what the attack looks like and how to defend against them.
In this data-rich one-hour webinar Jeremiah Grossman, founder of WhiteHat Security, presents findings from the 2015 Website Security Statistics Report. The report, generated by examining vulnerabilities in more than 30,000 websites under WhiteHat’s Sentinel management, provides unique perspectives on the state of website security.
In this webinar we will cover ways to counteract new rapid-paced hacking techniques, how adversaries are gaining pace with new tools and tactics, and why the old mantra of quarterly scanning to detect and patch may not work in the future.
In this webinar, Jeremiah Grossman, founder of WhiteHat Security, will address: Recent breaches and the financial impact to those organizations, statistics on vulnerabilities, remediation time, and how financial guarantees benefit customers.
The Top 10 Web Hacks Webinar, now in its ninth year, represents exhaustive research conducted by a panel of experienced security industry professionals. In this webinar, you will learn: The top web hacks, ranked by your peers and a panel of industry experts; How to protect your organization against these attacks; Industry wide research on new advanced attack techniques
Attackers chain low and moderate vulnerabilities together to exploit applications, taking advantage of issues that often go un-addressed. Learn how to use this technique to help you identify threats, attacks, vulnerabilities, and countermeasures that could affect your application.
WhiteHat Security and 451 Research help your team explore remediation and how to improve organizational processes. Also learn how WhiteHat Security can be your partner in helping your team to not only identify, but also to fix, vulnerabilities through a combination of technology and expertise.
This webinar will walk you through the current threat landscape, how vulnerabilities can be found, and how to mitigate control.