IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed    Add to Google    Add to My Yahoo!
Cyber SecurityMultimedia (View All Report Types)
 
Cyber Security Tips from a Customer like You
sponsored by Palo Alto Networks
WEBCAST: In this webcast, see how your peers are systematically mitigating cybersecurity risks by prioritizing network protection. Click now to explore a network security platform that can help you achieve top defense.
Posted: 27 Dec 2013 | Premiered: Dec 27, 2013

Palo Alto Networks

Rethinking Email Security: Best Practices to Protect and Maintain Private Communications
sponsored by Voltage Security, Inc.
WEBCAST: This webcast offers 9 best practices for successful policy-based encryption to improve email security.
Posted: 12 Jun 2014 | Premiered: Jun 12, 2014

Voltage Security, Inc.

A Pragmatic Approach to Benchmarking Application Security
sponsored by Veracode, Inc.
WEBCAST: In this webcast, a pragmatic approach is introduced to benchmark application security.
Posted: 25 Jun 2014 | Premiered: Jun 25, 2014

Veracode, Inc.

HP Cybercrime
sponsored by Hewlett-Packard Company
WEBCAST: This resource takes a look at some of the growing threats in today's IT landscape and outlines the need for an effective security management strategy.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett-Packard Company

The Threat Landscape: A View from the Inside
sponsored by Dell SecureWorks UK
WEBCAST: In this webcast, join Lee Lawson, head of the Security Testing and Response teams for EMEA, as he discusses today’s cyber threats facing organisations in the UK and across the globe.
Posted: 12 Oct 2011 | Premiered: Oct 12, 2011

Dell SecureWorks UK

Protecting Your Multi-Platform Network: The New Wave of Attacks
sponsored by ESET
WEBCAST: Join us to examine some of the malware risks associated with heterogeneous computing environments and solutions to protect your valuable business assets.
Posted: 20 Jun 2011 | Premiered: Jun 20, 2011

ESET

Webinar: 20 Critical Controls for Cyber Defense
sponsored by ISACA
WEBCAST: Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)

ISACA

This Month in the Threat Webscape for July 2009
sponsored by Websense, Inc.
VIDEO: In this video, learn more about the top techniques for defending your organization from Web threats. Techniques include the monitoring, classification, and identification of all Web content in real time.
Posted: 02 Sep 2009 | Premiered: 01 Sep 2009

Websense, Inc.

Survival Guide: Securing Networks without Borders Show
sponsored by Cisco Systems, Inc.
WEBCAST: In today’s era of borderless networks, minimizing your exposure to outside threats is more crucial than ever. In this video, discover how to reduce the potential attack surfaces available to data thieves without buying any new hardware or software. Learn the latest methods employed by hackers to gain access to your network and how to eliminate them
Posted: 20 Nov 2009 | Premiered: Nov 20, 2009

Cisco Systems, Inc.

The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape
sponsored by ESET
PODCAST: In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 
Posted: 02 Dec 2010 | Premiered: Dec 2, 2010

ESET
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement