www.cshub.com
Open in
urlscan Pro
54.227.24.106
Public Scan
URL:
https://www.cshub.com/threat-defense/webinars/runtime-application-self-protection-threats-and-antidotes
Submission: On August 26 via api from SG
Submission: On August 26 via api from SG
Form analysis
3 forms found in the DOMGET https://www.cshub.com/search
<form method="GET" action="https://www.cshub.com/search">
<div class="input-group col-md-12 pr-0">
<input id="query-input" name="q" type="text" class="search-query form-control" placeholder="Search..." style="padding: 0.375rem 0.75rem;">
<span class="input-group-btn">
<button class="input-group-text" style="background: none; border: none; padding: 0.375rem 0.75rem;" id="searchPrepend"><i class="fas fa-search"></i></button>
</span>
</div>
</form>
GET https://www.cshub.com/search
<form method="GET" action="https://www.cshub.com/search">
<div class="input-group col-md-12 pr-0">
<input id="query-input" name="q" type="text" class="search-query form-control" placeholder="Search..." style="padding: 0.375rem 0.75rem;">
<span class="input-group-btn mt-2">
<button class="input-group-text" style="background: none; border: none; padding: 0.375rem 0.75rem;" id="searchPrepend"><i class="fas fa-search"></i></button>
</span>
</div>
</form>
POST https://www.cshub.com/register/email?ty-pej
<form action="https://www.cshub.com/register/email?ty-pej" method="post">
<input type="hidden" name="_token" value="pOMhYaz4ZY44WiAldkMbqVqZrGzhUKxOVDQtHTfL">
<div class="form-group col-12 mb-1">
<input type="text" name="email" class="form-control text-center rounded-0" placeholder="Business Email" required="" value="">
</div>
<div class="form-group col-12">
<button type="submit" class="btn btn-info btn-block rounded-0 text-uppercase">Subscribe</button>
</div>
</form>
Text Content
× Cyber Security Hub IQPC Digital Get - On the Play Store INSTALL * Content Articles Case Studies Demos Interviews News Podcasts Reports Videos Whitepapers * Events Conferences Exchanges Online Events Webinars * My Network * About About Us About Membership Elite Sponsors Advertise With Us Partners Contributors Contact Us Advisory Board * * Sign In * Get Started * Content Articles Case Studies Demos Interviews News Podcasts Reports Videos Whitepapers * Events Conferences Exchanges Online Events Webinars * My Network * About About Us About Membership Elite Sponsors Advertise With Us Partners Contributors Contact Us Advisory Board * Sign In * Sign Up Attacks Cloud Data Executive Decisions IoT Malware Mobile Network Security Strategy Threat Defense Filter Categories Attacks Cloud Data Executive Decisions IoT Malware Mobile Network Security Strategy Threat Defense RUNTIME APPLICATION SELF-PROTECTION – THREATS AND ANTIDOTES Register -------------------------------------------------------------------------------- This webinar will take place on: 08 September, 2021 02:00 PM - 02:45 PM SGT Add To Calendar Outlook / iCal Outlook Web Google Yahoo AddThis Sharing Buttons Share to FacebookFacebookShare to TwitterTwitterShare to LinkedInLinkedInShare to EmailEmailShare to PrintPrintShare to MoreAddThis -------------------------------------------------------------------------------- This webinar provides an opportunity for attendees to take a deep dive into the most dangerous security vulnerabilities in the mobile application world. We will talk about the most common mobile threats on mobile Android and iOS platforms. During the webinar we will discuss which of the most common threats are the most dangerous for enterprises in terms of financial losses. We will compare security capabilities on Android and iOS platforms. Finally we will talk about best security practices to detect and prevent such threats on each platform with heuristic methods and AI based security solutions. Described techniques and mechanisms will helps you choose between most common security solutions on the market to find the best for clients of mobile financial services. During this webinar you will learn how to detect: * Root and Jailbreak * Debuggers, VM and Emulators You will find out how to prevent most common attacks based on: * Overlays * Screen Readers * Key Logges * Application Re-Packing * Code Injection -------------------------------------------------------------------------------- Speaker Paweł Bułat Cyber Security Department Manager Comarch Pawel is a manager of the Cyber Security Department, dedicated to delivering commercial products and services for Comarch’s clients all over the world. He has over 12 years of cyber security related professional experience in finance, telco, public administration. Sponsor -------------------------------------------------------------------------------- Register FIND CONTENT BY TYPE * News * Case Studies * Interviews * White Papers * Videos * Podcasts CYBER SECURITY HUB COMMUNITY * Power10 * About Us * Contact Us * Become a Member Today * Advertise with us * Cookie Policy * User Agreement * Become a Contributor ADVERTISE WITH US Reach Cyber Security professionals through cost-effective marketing opportunities to deliver your message, position yourself as a thought leader, and introduce new products, techniques and strategies to the market. LEARN MORE JOIN THE CYBER SECURITY HUB COMMUNITY Join CSHUB today and interact with a vibrant network of professionals, keeping up to date with the industry by accessing our wealth of articles, videos, live conferences and more. SIGN UP TODAY! Cyber Security Hub, a division of IQPC © 2021 All rights reserved. Use of this site constitutes acceptance of our User Agreement and Privacy Policy. Careers With IQPC | Contact Us | About Us | Cookie Policy * * * * * × Become a Member today! PLEASE ENTER YOUR EMAIL TO JOIN FOR FREE Subscribe Already an IQPC Community Member? Sign in Here or Forgot Password Sign up now and get FREE access to our extensive library of reports, infographics, whitepapers, webinars and online events from the world’s foremost thought leaders. We respect your privacy, by clicking 'Subscribe' you will receive our e-newsletter, including information on Podcasts, Webinars, event discounts, online learning opportunities and agree to our User Agreement. You have the right to object. For further information on how we process and monitor your personal data click here. You can unsubscribe at any time. We use cookies and similar technologies to recognize your visits and preferences, as well as to measure the effectiveness of campaigns and analyze traffic. To learn more about cookies, including how to disable them, view our Cookie Policy Close AddThis Sharing Sidebar Share to FacebookFacebook , Number of shares Share to TwitterTwitterShare to LinkedInLinkedInShare to EmailEmailShare to PrintPrintMore AddThis Share optionsAddThis , Number of shares Hide Show Close AddThis AddThis Sharing SHARESFacebookTwitterLinkedInEmailPrintAddThis Powered byPicreel