Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology Webinar: ImmuniWeb Application Security Platform

ImmuniWeb® Application Security Testing Platform leverages a machine learning technology for intelligent automation of web vulnerability scanning. Complemented by human intelligence, it detects the most sophisticated web application vulnerabilities and comes with zero false-positives SLA.

Women Talk Success in Security from 3 Perspectives | Panel

Embracing diversity is a key driver for success in today’s business world. As a young woman starting or developing her career in technology, you may find inspiration in hearing from other successful women. This live panel features 3 speakers from our R&D organization who will talk about their own career paths leading into security and will share tips and advice that they've learned along the way.

Cybersecurity Dissonance: Perception vs Reality Panel Discussion

Arctic Wolf recently completed a cybersecurity survey and found that nearly every company has very high confidence in their security defenses. However, the survey also identified that IT/security professionals felt security was complex, and they found it difficult to focus on security because their role covered so many different areas.

Cybersecurity Predictions: The Network Perimeter Will Be Reborn

The future of cybersecurity includes a major change to enterprise network perimeters. They are going to be reshaped into something new — micro-perimeters. This is the act of cordoning-off entire sections of systems in order to avoid major compromise when only one segment of the architecture is weak.

Cybersecurity Predictions: Effectiveness is measured by risk reduction

In the past, security technology wasn’t as regularly tested in the “real world” as it is today. That is, breaches are happening and being publicized at a far higher rate than ever before. There are seemingly multiple breaches a week. This means the security technology behind those breaches may get 15 minutes of undesired fame and the CSO gets a meeting with her boss. Going forward, security vendors will need to answer the question, “Does this security technology work?” Security stakeholders within an enterprise will answer the question, “Does this security technology work for me?”