IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Hostile Threats

RSS Feed    Add to Google    Add to My Yahoo!
Hostile Threats Multimedia (View All Report Types)
 
IBM Application Security Solutions Demo
sponsored by IBM
SOFTWARE DEMO: IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008

IBM

Correlating SIM Information to Detect Insider Threats
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.
Posted: 13 Jul 2007 | Premiered: Jun 18, 2007, 13:00 EDT (17:00 GMT)

Hexis Cyber Solutions Inc

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

Debunking the Top 5 Misconceptions about Data Protection
sponsored by Lumension
PODCAST: Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Posted: 28 Apr 2008 | Premiered: Apr 28, 2008

Lumension

Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

Selecting a SIEM: Experiences from the Trenches
sponsored by LogRhythm, Inc.
WEBCAST: This webcast features a panel discussion that will give you practical insights from SIEM veterans to help you refine your security intelligence strategy.
Posted: 06 Aug 2015 | Premiered: Aug 6, 2015

LogRhythm, Inc.

App Refactoring: How to Extend Application Virtualization
sponsored by StarMobile
WEBCAST: In this webcast, Todd Bryburger from StarMobile joins Brian Madden to discuss app refactoring, and how to extend application virtualization to capitalize on all enterprise mobility spaces.
Posted: 30 Jul 2015 | Premiered: Jul 30, 2015

StarMobile

Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
PODCAST: This podcast discusses ways to mitigate zero-day vulnerabilities and to detect subtle zero-day attacks.
Posted: 19 Aug 2015 | Premiered: Jul 30, 2015


"Appifying" the Enterprise Mobility Landscape
sponsored by StarMobile
WEBCAST: In this webcast, Brian Katz talks with Todd Fryburger, CEO of StarMobile, about "Appifying" your enterprise with a codeless, cloud-based solution, which transforms existing enterprise sources and legacy systems into mobile apps with a native user experience.
Posted: 10 Aug 2015 | Premiered: Aug 3, 2015

StarMobile

ASG Capacity Planning and Modeling Management Solutions
sponsored by ASG
VIDEO: IT infrastructure tends to be complex and expensive. It's up to you to make the right buying decisions to help reduce both the complexity and cost of IT, so where can you turn? Tune into the following video to learn how ASG PERFMAN can help.
Posted: 26 Aug 2015 | Premiered: 26 Aug 2015

ASG
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement