Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:01 AM
Dark Reading
Dark Reading
Products and Releases

WhiteHat Webinar: Affordable Website Security For The Growing Business

Designed for growing businesses, the WhiteHat webinar will review affordable, timely, and highly accurate Web application vulnerability management tactics

WhiteHat Security today announced that Trey Ford, the company's director of solutions architecture, will host a webinar discussing how to achieve complete website security even with budget cuts, head count reduction and increased responsibilities on tap for 2009 and beyond. Designed for growing businesses, the WhiteHat webinar will review affordable, timely, and highly accurate Web application vulnerability management tactics to defeat hackers and protect websites across verticals.

During the webinar, Ford will touch upon the following concepts: Tracking Website Asset Inventory - How to see websites as attackers do, as a process of target selection. Evaluating Website Value - Do companies' priorities reflect how attackers value websites? Assessing Security Investments - How to best optimize website security strategy for coverage that reflects asset value. Tactical Mitigation - Are companies managing vulnerabilities according to a strict methodology, or does their audit defense sound more like a firehouse? Strategic Remediation - Do website owners' vulnerability metrics empower strategic decisions toward WAF integration, SDL adjustments and architectural analysis?

Trey Ford is the director of solutions architecture at WhiteHat Security, providing strategic guidance to WhiteHat customers and prospects on their website security programs. Mr. Ford spearheads WhiteHat's participation in the PCI community and aids customers in maintaining compliance by measuring threat and managing risk to websites.

Mr. Ford is also a frequent speaker at industry events, including CSI 2008, the OWASP NYC AppSec 2008 Conference and ITW 2008. He is a Certified Information Security Professional (CISSP), Qualified Data Security Professional (QDSP), Qualified Security Assessor (QSA) and is a member of the PCI Qualified Security Assessor Network.

To register, please paste the following link into your browser's address bar: https://whitehatsec.market2lead.com/go/whitehatsec/affordable022509 and complete the brief online registration form. WhiteHat will send you a confirmation email with the URL and the appropriate credentials to participate.

About WhiteHat Security, Inc. Headquartered in Santa Clara, California, WhiteHat Security is the leading provider of website security solutions that protect critical data, ensure compliance and narrow the window of risk. WhiteHat Sentinel, the company's flagship product family, is the most accurate, complete and cost-effective website vulnerability management solution available. It delivers the flexibility, simplicity and manageability that organizations need to take control of website security and prevent Web attacks. Furthermore, WhiteHat Sentinel enables automated mitigation of website vulnerabilities via integration with Web application firewalls. To learn more about WhiteHat Security, please visit our website at www.whitehatsec.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This gives a new meaning to blind leading the blind.
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-16
ZOLL Defibrillator Dashboard, v prior to 2.2,The affected product’s web application could allow a low privilege user to inject parameters to contain malicious scripts to be executed by higher privilege users.
PUBLISHED: 2021-06-16
ZOLL Defibrillator Dashboard, v prior to 2.2,The affected products contain insecure filesystem permissions that could allow a lower privilege user to escalate privileges to an administrative level user.
PUBLISHED: 2021-06-16
ZOLL Defibrillator Dashboard, v prior to 2.2,The application allows users to store their passwords in a recoverable format, which could allow an attacker to retrieve the credentials from the web browser.
PUBLISHED: 2021-06-16
Zoho ManageEngine ServiceDesk Plus MSP before 10519 is vulnerable to a User Enumeration bug due to improper error-message generation in the Forgot Password functionality, aka SDPMSP-15732.
PUBLISHED: 2021-06-16
In Zoho ManageEngine Password Manager Pro before 11.1 build 11104, attackers are able to retrieve credentials via a browser extension for non-website resource types.