June 2015

WEBINAR: Fundamentals of Enterprise API Security

By | Date posted: June 15, 2015

Date:     Wednesday, July 15, 2015
Time:    10:00am – 11:00am ET | 3:00pm – 4:00pm GMT
REGISTER

As enterprise and government organizations move toward virtual technology and software-defined networks, information assurance and trusted APIs are essential components of external integration, internal integration, and architecture design. Without the right approach, solutions become complex, costly, and expose organizations to security risks. API security represents the consolidated capabilities of data security, logical access control, and threat mitigation.

Building a proper API security infrastructure provides many benefits. In this webinar, Nolan O’Dwyer, Architect at HP, and guest speaker Randy Heffner, VP and Principal Analyst at Forrester Research, will share the key components and best practices for implementing enterprise API security.

REGISTER

Feature Presentations:

Implementing Agile API Security: HP’s Strategy for UK Public Sector
Nolan O’Dwyer – Architect, HP

Cybersecurity in the API Economy
Randy Heffner – VP and Principal Analyst, Forrester

Moderator:

Jason Macy – CTO, Forum Systems

 

Forum Systems to Showcase Award-Winning API Gateway at AFCEA Defensive Cyber Operations Symposium

By | Date posted: June 10, 2015

Forum Systems announced today that it will be showcasing its award-winning API Gateway, Forum Sentry, at the 2015 AFCEA Defensive Cyber Operations Symposium in Booth # 3014. Taking place June 16-18 at the Baltimore Convention Center, the event is designed to promote collaboration between government and industry partners in order to improve security and better defend the cyber mission space. Read more

OPM Breach Proves Einstein Cybersecurity Not Enough

By | Date posted: June 8, 2015

It should come as no surprise to anyone that a major breach has occurred at OPM and took many months to detect. For far too long the cybersecurity industry has focused attempts at trying to understand a network through heuristics and analytics without the capability to enforce what the systems in the network are actually meant to do, and what information they are meant to receive and send. Read more