Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Jan 25, 2022

Modern attack surfaces are evolving and morphing as API use is increasing. From car hire to medical records, APIs power applications that impact lives. Technical challenges and human error make it possible for vulnerable APIs to make their way into production environments where they often have a negative impact downstream. Once deployed or integrated into larger applications, these APIs are hard to mitigate and even harder to remediate. Scanning and testing APIs in a runtime environment helps security teams uncover vulnerabilities in APIs before they're in production, where remediation is more costly and frustrating. Understanding how to secure APIs is a struggle for most security teams. Conflicting guidance on runtime testing best practices creates confusion and delay.

Jan 27, 2022

The debate about the usefulness of passwords rages on. But most security experts agree that data protection is not adequate with simple password protection. Which tools and strategies for authentication should you consider today to up-level your authentication strategy? How can you move beyond the password and implement next generation authentication technology? In this webinar, experts offer a broad look at your options for multifactor authentication, the challenges and pitfalls of these options, and how to develop an authentication strategy that works best for your enterprise.

Feb 02, 2022

In the wake of COVID-19, many IT departments find themselves managing more remote and work-from-home systems than ever before. What does this mean for cybersecurity? In this webinar, top experts discuss methods for rethinking remote access and end user systems to provide additional layers of security for home workers. You'll learn how you can adapt your current security tools and practices to create a more secure environment for remote and hybrid workers, and how to avoid current threats that target home workers.

Feb 09, 2022

2021 was an exceptionally busy year for attackers. From some of the largest volumetric DDoS attacks launched by historically large swarms of botnets, to massive ransomware and ransom DDoS attack campaigns that interrupted aspects of critical infrastructure around the world, DDoS was the focal point of network security for many organizations. As attackers continue to evolve their techniques and get more brazen with their attacks, how can organizations protect their network infrastructure to stay online with minimal to no impact on their business and operations?

Feb 10, 2022

There are many resources, both public and commercial, that collect information about current trends in online attacks. This "threat intelligence" can make it easier for security teams to prioritize their defense efforts and prepare for online exploits that are likely to hit their organizations. In this webinar, experts will discuss strategies for collecting and analyzing threat intelligence to inform your cyber defense practices. You'll also learn how to integrate threat intelligence with your defense and incident response initiatives so that your IT security team can build processes and automated systems that speed the detection and mitigation of sophisticated online threats.

Feb 15, 2022

Managing and securing user credentials was never easy, and now that they are scattered across cloud platforms, software-as-a-service tools, mobile devices, and on-premises systems, the task has become even more complex. With adversaries increasingly targeting their attention to credential theft, enterprise defenders need to know what accounts they have and where they are located. In this webinar, experts discuss the best practices for identity and access management in the cloud, and how to gain visibility into misconfigured or improperly secured cloud-based accounts.

Feb 23, 2022

As more companies adapt their policies to accommodate the fact that many employees will continue to work from home, the IT security manager has to expand the concept of "endpoint security." Does that include the employee's personal printer and home wireless network? How much responsibility is your enterprise going to take for the security of personal devices? How do you protect their credentials for cloud-based applications and manage their identities so that attackers can't weaponize those accounts against your organization? In this webinar, experts offer recommendations on how to build the endpoint security strategy that balances what end users may use to get their work done and what the enterprise is able to accommodate. You will receive tips on how to develop a consistent endpoint security strategy that works for all users and applications. You will walk away with a clearer idea of how your enterprise can tackle the endpoint security problem.

Mar 02, 2022

Recent attacks like the zero-day Log4j vulnerability have brought new scrutiny to cyber threats from suppliers and enterprise trading partners. But what does an effective supply-chain security strategy look like? How can you ensure that customers, suppliers, contractors, and others in your supply chain are doing what they should to protect their systems - and their connections to your enterprise? In this webinar, experts discuss strategies and technologies you can use to assess the security capabilities of your trading partners, and to ensure that future attacks on application providers won't damage your organization's data - or inadvertently cascade on to external third-parties.

Mar 24, 2022

Every day, enterprises are faced with a new round of online exploits that they've never seen before - and wondering if their current technology defenses are enough. At the same time, cybersecurity technology vendors are regularly rolling out new products and services. How can your security team keep up? What are the latest emerging security technology and services that can help you? What are the latest emerging tools and technologies for detecting ransomware and mitigating it before it spreads? These are just some of the issues that will be explored in this free, all-day online conference produced by the editors at Dark Reading. Top security experts and researchers will discuss ways to identify the emerging technologies that can improve your cyber defense - and offer tips on the best path for implementing them.

On-Demand Webinars

2021-12-02 13:00:00 EST

Today, we're counting on our corporate networks more than ever. Complex applications, remote access, and demands for edge computing continue to grow exponentially in these difficult times.  Network monitoring and troubleshooting have no plans of going away. In this webinar, we'll be covering the state of network optimization and tools and techniques for troubleshooting.

2021-10-06 13:00:00 EDT

When organizations need to protect their on-prem networks, IT departments typically turn to old, legacy hardware boxes. These hardware boxes are expensive, hard to manage, and slow. To complicate matters further, legacy approaches to connectivity (re: MPLS) and security (re: on-prem firewalling and DDoS ‘scrubbing centers’) just don’t work for today’s distributed workforce and cloud-hosted applications.

Between cloud app adoption growth and the work-from-home mode of operation becoming part of business as usual, the Internet is mission-critical: to share data, solve challenges, and stay connected. But as the importance of the internet increases so too do the risks of cyber threats and network demands.

Join this informative webinar where you will hear experts discuss the death of network hardware appliances and how cloud-native architectures can help you continue to provide secure, enterprise-class connectivity.