IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Multimedia (View All Report Types)
1 - 25 of 53 Matches Previous Page  |  Next Page
IT Security and the Devops Environment
sponsored by CyberArk Software, Inc
WEBCAST: DevOps environments are unique because of the speed and scale at which they work. Watch this webcast to reveal characteristics regarding DevOps environments as well as the security aspects of DevOps.
Posted: 19 Sep 2017 | Premiered: Sep 19, 2017

CyberArk Software, Inc

IT Security and the Devops Environment
sponsored by CyberArk Software, Inc
WEBCAST: Watch this webcast to reveal how to improve application and infrastructure security and to engage in methods of delivering security that don't interrupt the fast flow and time to delivery.
Posted: 19 Sep 2017 | Premiered: Sep 19, 2017

CyberArk Software, Inc

Proactively Protect Against Ransomware
sponsored by CyberArk Software, Inc
WEBCAST: Watch this webcast to reveal steps your organization can proactively take to prevent and not react to the threat of ransomware.
Posted: 19 Sep 2017 | Premiered: Sep 19, 2017

CyberArk Software, Inc

Forensic State Analysis: A New Approach to Threat Hunting
sponsored by Infocyte
WEBCAST: Watch this webcast to uncover strategies to reduce the dwell time of attackers and improve your threat hunting techniques.
Posted: 18 Sep 2017 | Premiered: Apr 3, 2017

Infocyte

Unpredictable Humans - Still the weakest link in data security
sponsored by Code42
WEBCAST: 78% of security professionals say the biggest threat to endpoint security is negligent or careless employees who do not follow security policies. Watch this webinar to uncover strategies on how to protect your enterprise while moving data around on mobile devices.
Posted: 05 Sep 2017 | Premiered: Sep 5, 2017

Code42

Why Digital Signing and Verification is Paramount in Cross Domain Environments
sponsored by OPSWAT inc
WEBCAST: Malware targets USB keys and 1 out of every 8 attacks comes via USB. Watch this webcast to uncover how to protect your critical networks against recent portable media threats.
Posted: 22 Aug 2017 | Premiered: Aug 22, 2017


Unknown Threat Detection Platform
sponsored by OPSWAT inc
WEBCAST: Protecting potentially harmful code is essential when securing your data. Watch this webcast to uncover how to block unknown threats and detect outbreaks.
Posted: 22 Aug 2017 | Premiered: Aug 22, 2017


Stop Attacks in Real-Time with Threat Intelligence
sponsored by Cisco Umbrella
VIDEO: Take a closer look into how threat intelligence can take massive amounts of information and make sense of it all. See how you can use this strategy to respond to threats in real-time before they become attacks.
Posted: 14 Aug 2017 | Premiered: 07 Mar 2017

Cisco Umbrella

How Ransomware is Evolving into the Perfect Crime
sponsored by Barkly
WEBCAST: Ransomware is on the rise. The 2017 WannaCry ransomware attack impacted 300,000 systems in 150 countries, while NotPetya affected 100,000 systems in 65 countries. Access this in-depth webcast to get a full understanding of new ransomware trends.
Posted: 03 Aug 2017 | Premiered: Aug 3, 2017

Barkly

Cisco Umbrella: How does it Improve Security Effectiveness?
sponsored by Cisco Umbrella
VIDEO: Threat detection and prevention is crucial to the security of your business. Join Steve Martino, CISO of Cisco, and his staff as they explain the value of Cisco Umbrella in improving overall security effectiveness.
Posted: 28 Jul 2017 | Premiered: 03 Feb 2017

Cisco Umbrella

Cisco Umbrella Investigate: Threat Intelligence Overview
sponsored by Cisco Umbrella
VIDEO: Enterprises today face huge challenges in information security. Attackers are waiting around every corner to cause damaging breaches. In this brief overview, learn about Cisco Umbrella Investigate, which provides threat intelligence about domains and IPs across the Internet.
Posted: 28 Jul 2017 | Premiered: 11 Nov 2016

Cisco Umbrella

Passwords Are Out: But What's Replacing Them?
sponsored by Crossmatch
PODCAST: Join experts Keven Beaver and Jeff Carpenter in this podcast as they discuss why passwords are obsolete and what the "human-proofed" future of IAM and authentication will look like.
Posted: 25 Jul 2017 | Premiered: Jun 30, 2017

Crossmatch

Closing the Cloud Security Readiness Gap
sponsored by HyTrust
WEBCAST: Discover why security readiness lags behind adoption in the cloud and what can be done to mitigate the vulnerability and risk that creates.
Posted: 24 Jul 2017 | Premiered: Jul 24, 2017

HyTrust

Post-Password Security: AI, Risk-Based and Context
sponsored by Crossmatch
WEBCAST: Weak and stolen passwords lead to data beaches, but how do you get rid of them? Join experts Kevin Beaver and Jeff Carpenter as they explore the future of authentication post-password.
Posted: 24 Jul 2017 | Premiered: Jun 29, 2017

Crossmatch

Passwords are Out: But What's Replacing Them?
sponsored by Crossmatch
WEBCAST: Join experts Keven Beaver and Jeff Carpenter in this webcast as they discuss why passwords are obsolete and what the "human-proofed" future of authentication will look like.
Posted: 24 Jul 2017 | Premiered: Jun 29, 2017

Crossmatch

Composite Authentication: Security Beyond Passwords
sponsored by Crossmatch
WEBCAST: In this webcast, security experts Kevin Beaver and Jeff Carpenter discuss what composite authentication is, how it evolved, and its place in the future of security.
Posted: 21 Jul 2017 | Premiered: Jun 29, 2017

Crossmatch

Intelligent Threat Response and Risk Reduction for Today's Mobile Workplace
sponsored by Aruba Networks
WEBCAST: Mobile security is a crisis waiting to happen; and once the security event occurs it's hard to get things back under control. Join experts Kevin Beaver, Trent Fierro, and Jamie Chiu as they dive into how to tackle intelligent threat protection for a modern, mobile user network
Posted: 07 Jul 2017 | Premiered: Jun 21, 2017

Aruba Networks

The Current State of Open Source Software
sponsored by Flexera Software
WEBCAST: With open source software's explosion of popularity, organizations need to know how much of a risk these components present to their business. Learn the reasons behind the massive increase in OSS usage, the risk it carries and how to gain deep analysis to give you actionable insight.
Posted: 06 Jul 2017 | Premiered: Jul 6, 2017

Flexera Software

An Introduction to Open Source Licensing: A Legal Perspective
sponsored by Flexera Software
WEBCAST: There is a lot of confusion when it comes to open source software (OSS). Discover a detailed presentation from expert Andrew Hall on what OSS is and its fundamentals, risks, benefits, obligations, restrictions, and how to ensure your organization is protected.
Posted: 05 Jul 2017 | Premiered: Jul 5, 2017

Flexera Software

Become a Champion of PCI Compliance by Minimizing Your Attack Surface
sponsored by Centrify Corporation
PRODUCT DEMO: Don't miss your chance to download a free trial of a privileged identity management tool that will help you meet the latest PCI DSS regulatory requirements. Access now to receive guidance on the best deployment option for your business needs, technical support for the duration of the evaluation process, and more.
Posted: 28 Jun 2017 | Premiered: 28 Jun 2017

Centrify Corporation

Protect Against Cyberattacks and Data Breaches with Multi-Factor Authentication
sponsored by Centrify Corporation
PRODUCT DEMO: Access this free trial of multi-factor authentication (MFA) to add an additional layer of security, beyond passwords, to your enterprise, across apps, endpoints and infrastructure. Here, learn how to stop in progress attacks that leverage compromised credentials when users elevate privilege, and more.
Posted: 28 Jun 2017 | Premiered: 28 Jun 2017

Centrify Corporation

Protecting Sensitive Corporate Data Against the Full Spectrum of Mobile Risk
sponsored by Lookout
WEBCAST: Download this webcast to discover a full EMM platform that will protect sensitive corporate data against the full spectrum of mobile risks, from software vulnerabilities to behavior and configuration threats.
Posted: 26 Jun 2017 | Premiered: Jun 6, 2017

Lookout

Gain Visibility into the Cloud with This Free Trial
sponsored by AlienVault
TRIAL SOFTWARE: Visibility into the cloud can be a challenge for businesses. Uncover how to detect threats in the cloud environment and access a 14-day free trial of AlienVault's USM Anywhere Sensor.
Posted: 21 Jun 2017 | Premiered: 21 Jun 2017

AlienVault

Power of Proxy in Security
sponsored by Symantec
WEBCAST: With defense in depth vital to protecting your enterprise, discover how a proxy system can tackle advanced threats, combat the "too many devices" problem, ensure compliance, and more.
Posted: 19 Jun 2017 | Premiered: Jun 6, 2017

Symantec

Step Up Your Security and Privacy with Data Masking
sponsored by Delphix
WEBCAST: For many organizations, the most confidential information exists in some of the least-secure environments. Learn why data masking is an effective approach to protecting sensitive environments from a variety of threats. Discover challenges and best practices for implementing data-masking tools, and more.
Posted: 07 Sep 2017 | Premiered: Aug 28, 2017

Delphix
1 - 25 of 53 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement