IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Multimedia (View All Report Types)
 
Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Protect Your Enterprise with Security Monitoring
sponsored by Hewlett-Packard Limited
VIDEO: This brief video introduces a security monitoring system that effectively detects and stops risks.
Posted: 06 Apr 2015 | Premiered: 16 May 2014

Hewlett-Packard Limited

Understanding Today's Information Security Threats
sponsored by Dell SecureWorks
VIDEO: This video can help you understand what information security threats your organization faces and how you can best combat them.
Posted: 10 Jul 2015 | Premiered: 10 Jul 2015

Dell SecureWorks

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

Connecting the Server Room to the Board Room
sponsored by SurfWatch Labs
VIDEO: This video describes how an effective security intelligence application can help executives understand the security risks their business faces.
Posted: 13 Jul 2015 | Premiered: 10 Apr 2015

SurfWatch Labs

Increase Security Effectiveness with Threat Intelligence
sponsored by Cyveillance, Inc.
WEBCAST: This webcast explains the benefits of implementing an effective threat intelligence system.
Posted: 13 Jul 2015 | Premiered: Jun 30, 2015

Cyveillance, Inc.

Death and Taxes...and Hackers
sponsored by Imperva
VIDEO: View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
Posted: 01 Apr 2011 | Premiered: 01 Apr 2011

Imperva

Mobile App Security: All You Need to Know
sponsored by Maas360 by IBM
WEBCAST: This webcast helps mobile application developers embed enterprise-grade security in their applications.
Posted: 25 Feb 2015 | Premiered: Feb 25, 2015

Maas360 by IBM

Webinar: 20 Critical Controls for Cyber Defense
sponsored by ISACA
WEBCAST: Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)

ISACA

Disclosures 2012 - The Vulnerability of Publicly Traded Companies
sponsored by Veracode, Inc.
WEBCAST: In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.
Posted: 24 May 2012 | Premiered: May 23, 2012

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement