December 02, 2010 10:10 ET
CoreTrace to Host Webinar With Richard Stiennon Titled "Stuxnet: Variations Coming to Your Computers Soon"
Cyber Warfare Expert Predicts Stuxnet "Clones" Will Evolve, Continue to Pose Serious Threat in 2011
AUSTIN, TX--(Marketwire - December 2, 2010) - CoreTrace®, the leading provider of secure and flexible application whitelisting solutions, announced today that it will host a live webinar on Tuesday, Dec. 14, 2010 titled, "Stuxnet: Variations Coming to Your Computers Soon." Chief research analyst at IT-Harvest, Richard Stiennon, and president and CEO of CoreTrace and a former Air Force information warfare officer, Toney Jennings, will lead the free, interactive session.
Discovered earlier this year, the Stuxnet advanced threat has caused havoc and is credited with slowing Iran's nuclear refining program. Richard Stiennon, one of the world's leading experts in cyber warfare and the author of "Surviving Cyberwar," predicts variations of Stuxnet will begin targeting systems and critical processes on platforms from power grids to manufacturing controls around the globe in 2011. Attendees of this webinar will:
- Get an in depth explanation on what Stuxnet is -- including its multitude of attack techniques from memory exploits to self-updating payloads.
- Understand why Stuxnet is a model of threats that all industries will need to counter going forward.
- Get recommended approaches/solutions that can help IT organizations stop these types of sophisticated, targeted and pernicious threats.
Tuesday, December 14, 2010
2 p.m. EST / 11 a.m. PST
Note: A replay of the Webinar will be available following the live event via the same registration URL.
To register for the free webinar, please visit:
CoreTrace® is the leading provider of application whitelisting-based solutions. The company's award-winning and patented BOUNCER solution is at the forefront of the movement to improve security and endpoint performance by combining application whitelisting for real-time malware prevention and cloud-based blacklists for detection and reporting. Unlike other application whitelisting solutions that are simply lockdown technologies, BOUNCER's "Trusted Change" capability enables IT professionals to predefine multiple sources from which users can safely install applications and have them automatically added to the whitelist -- all with minimal IT involvement. The result: full prevention of unauthorized applications, improved overall security, and lower total cost of ownership. CoreTrace's customers include organizations in a wide variety of industries, such as energy, oil and gas, retail, financial services, telecommunications, as well as government agencies.
For more information, visit the CoreTrace website or follow the conversation at WhiteSpace, the application whitelisting and security weblog.