Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

The Security Implications of Web 2.0

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

There can be no doubt - the collaborative benefits of Web 2.0technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide.

But, just as Web 2.0 brings new and significant advantages to the business table, so there are new and highly threatening security risks that also creep in alongside.

These risks include multi-vectored attack methodologies; pull joins push and polymorphic malware all complicate defense strategies, as well as causing headaches for the IT staff and their management.

Research has shown that 90% of attacks now take place at the application layer, exploiting software-based or social vulnerabilities.

But there are solutions for the security headache.

Join us for an entertaining and informative webinar in which our team of seasoned professionals will detail the changing face of web threats and what organizations should be doing to protect themselves

This webinar will:

  • Explain the security threats that the social generation Internet poses to your organization.
  • Show the popular methods used to infect, steal and use personal data using the new Internet applications and the impact to the user, the services themselves - and your corporate network.
  • Detail why traditional security tools do not address these threats.
  • Educate you about the audit and risk analysis safeguards you can employ.

This webinar is for:

  • IT managers looking for social generation Internet solutions.
  • IT staff wishing to further their knowledge of Web 2.0 services.
  • Anyone wanting to understand more about the latest generation of Internet security threats and how to cost-effectively counter them.


Ben Chai

Ben Chai Analyst, Incoming Thought

    Steve Gold

    Steve Gold, Infosecurity Magazine

      Sam Masiello

      Sam Masiello Vice President of Information Security, MX Logic