IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Multimedia (View All Report Types)
 
An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

GigaSECURE Security Delivery Platform
sponsored by Gigamon
VIDEO: Discover how to shift your security strategy from perimeter defenses towards a detect and protect frameworkm gaining greater visibility in the process. Learn how to extend the reach of your security applications everywhere on your network by giving them the right traffic at the right time.
Posted: 23 Sep 2016 | Premiered: 04 Aug 2015

Gigamon

Understanding Account Takeover Attacks
sponsored by IMMUNIO, Inc.
PODCAST: Discover the necessary steps to prevent hacking via stolen credentials on your web applications. Learn how to protect your online accounts and get to the bottom of why hackers want to take over these accounts.
Posted: 08 Sep 2016 | Premiered: Aug 24, 2016

TOPICS:  Cybersecurity
IMMUNIO, Inc.

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WEBCAST: In this webinar, three cyber security veterans discuss today's rapidly evolving cyber threat landscape and how you can detect advanced threats that normally go undetected.
Posted: 06 Aug 2015 | Premiered: Aug 6, 2015

LogRhythm, Inc.

Cybersecurity Evolves: Risk in the Age of Dark Data, IoT and Advanced Analytics
sponsored by SearchSecurity.com
VIRTUAL SEMINAR: This virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com focuses on the big changes impacting today's cyber security practices. The day's agenda is expressly designed to identify and develop risk management strategies specifically tailored to mitigate the threats your business will inevitably face.
Posted: 28 Jul 2016 | Premiered: 20 Jul 2016

SearchSecurity.com

Podcast: Insider Threats - an Interview with the Former Deputy Director of the National Security Agency - NSA
sponsored by Imperva
PODCAST: Bill Crowell, former Deputy Director of the NSA, is interviewed in this podcast. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection –- especially around mission-critical applications and databases.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM

Mobile App Security: All You Need to Know
sponsored by Maas360 by IBM
WEBCAST: This webcast helps mobile application developers embed enterprise-grade security in their applications.
Posted: 25 Feb 2015 | Premiered: Feb 25, 2015

Maas360 by IBM

Reducing Security Complexity
sponsored by Optus Business
VIDEO: In this webcast, you will be provided with a high level overview of the emerging threats within the Australian security landscape and how these affect midsized organisations.
Posted: 04 Sep 2013 | Premiered: 27 Aug 2013

Optus Business
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement