Search Results for: security

Prevention Is Your First Line of Defense from Ransomware. But What If Prevention Fails? (VIDEO)
Placeholder

StorageCraft Technology Corporation

IT Priorities 2018 - What's happening in security?
In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.

TechTarget ComputerWeekly.com

Security by Design: How AEC is Embedding Security into Building Design
With most security discourse is concerned with defending your business-critical data and other digital infrastructure, it can be easy to lose sight of where your organization is most vulnerable; It’s physical location. Watch the webcast to learn why security needs to be calculated into the foundation of building design.

TOPICS: .NET
Brivo

How is IoT security evolving?
Yes, IoT devices present innovative opportunities. Yet, given that many of those devices lack built-in security controls, IoT devices also present security risks. For a deep dive on the state of IoT security, check out this webcast featuring three leaders from Portnox.

TOPICS: .NET
Portnox

Why Just Securing Human Identities Is Not Enough
If your business leverages digital technology, then securing human access is not enough - attackers will find the weak point. Don’t let it happen to you! In this session you'll learn why you need to secure both your human and machine identities, as well as the applications and workloads they access. Tune in now to learn more.

CyberArk

Securing the Software Supply Chain
In recent years, the software supply chain has experienced the worst and most consequential cyber attacks out of any other sector. In fact, 98% of organizations have felt the impact of a breach in their supply chain. So, what steps can you take to better protect your software supply chain? Tune into this webinar to learn more.

TOPICS: .NET
Keeper Security Inc

Securing Your APIs: What You Need to Know
If you have APIs unaccounted for out in the wild, they’re just a security breach waiting to happen. But how can your organization balance tight security with fast development times? This webinar dives into what you need to know to secure your APIs, including how to shift left effectively and how to solve the runtime security problem. Tune in here.

TOPICS: .NET
Veracode, Inc.

Building a security posture for the cloud
Cloud environments, while having opened the door to many opportunities, have also introduced added complexity into the security equation. In this webcast, ESG Senior Analyst, Melinda Marks, meets with AWS’s Anthony Smith and Palo Alto’s Jason Williams, to explore the importance of managing security posture in the cloud. Watch now to learn more.

TOPICS: .NET
AWS Palo Alto Networks

Secure Your Environment and Eliminate Secrets Sprawl
As cyber threats continue to get more innovative and attack surfaces continue to expand, many organizations are looking for new ways that they can ensure their information stays safe. So, what can DevOps, security, and IT leaders do to keep up? Tune into this webinar to discover more.

TOPICS: .NET
Keeper Security Inc

How Security Teams Are Solving Vault Sprawl With a Modern SaaS Solution
The importance of a centralized identity security program is vital for both human and machine identities. While other vaults and open-source tools have their merits, these on-premises tools often require costly skills and resources to host and maintain. Join this webinar to learn the benefits of centralizing your secrets management.

CyberArk