IT Management  >   Systems Operations  >   Security  >   Web Application Security  >  

.NET Security

RSS Feed    Add to Google    Add to My Yahoo!
.NET SecurityMultimedia (View All Report Types)
 
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
sponsored by AlienVault
WEBCAST: This exclusive webcast covers a unified security management platform that will protect your end-users from watering hole attacks.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

AlienVault

Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation
sponsored by Intel
WEBCAST: This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.
Posted: 14 Feb 2011 | Premiered: Oct 13, 2010

Intel

Podcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
PODCAST: In this podcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

The Current State of Identity and Access Management
sponsored by RSA, The Security Division of EMC
VIDEO: This video explains the major shift with Identity and Access Management (IAM) in the past few years.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA, The Security Division of EMC

Manage IT like a Super Hero: Save time, Reduce cost and Innovate in the era of Cloud
sponsored by IBM
WEBCAST: Register for this exclusive event to explore some IBM solutions that can help you operations, performance, analytics, automation and delivery of IT services in today's complex on-premise and cloud environments.
Posted: 24 Oct 2014 | Premiered: Sep 30, 2014

IBM

How Often Should IT Security and Firewalls be Upgraded?
sponsored by Icomm Technologies
VIDEO: Download this exclusive video now to learn about important lifecycle consideration factors, like cost and firmware upgrades, and much more.
Posted: 30 Oct 2014 | Premiered: 30 Oct 2014

Icomm Technologies

Self-Service Strategies That Put Service Relationship Management Into Hyperdrive
sponsored by Hewlett-Packard Company
WEBCAST: Take a look at this exclusive webcast to learn more about implementing effective self-service strategies.
Posted: 28 Aug 2014 | Premiered: Aug 28, 2014

Hewlett-Packard Company

Demo: RSA ECAT
sponsored by RSA, The Security Division of EMC
VIDEO: Watch this demo to see what real-time malware analysis on the endpoint looks like with RSA ECAT.
Posted: 28 Oct 2014 | Premiered: 28 Oct 2014

RSA, The Security Division of EMC

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by HID
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

HID

Best Practices for Leveraging Security Threat Intelligence
sponsored by AlienVault
WEBCAST: This exclusive webcast explores how you can use threat intelligence to stop attacks before they ever happen.
Posted: 09 Oct 2014 | Premiered: Oct 9, 2014

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement