IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Hostile Threats

RSS Feed    Add to Google    Add to My Yahoo!
Hostile ThreatsMultimedia (View All Report Types)
 
Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

Debunking the Top 5 Misconceptions about Data Protection
sponsored by Lumension
PODCAST: Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Posted: 28 Apr 2008 | Premiered: Apr 28, 2008

Lumension

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

Correlating SIM Information to Detect Insider Threats
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.
Posted: 13 Jul 2007 | Premiered: Jun 18, 2007, 13:00 EDT (17:00 GMT)

Hexis Cyber Solutions Inc

IBM Application Security Solutions Demo
sponsored by IBM
SOFTWARE DEMO: IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008

IBM

SIEM missteps? Tips to Help you move Forward
sponsored by LogRhythm, Inc.
WEBCAST: Download this expert webcast now to learn about implementing the necessary practices for effective security information and event management use.
Posted: 24 Nov 2014 | Premiered: Nov 13, 2014

LogRhythm, Inc.

The New Style of IT
sponsored by Hewlett-Packard Company
VIRTUAL ENVIRONMENT: Access this assessment tool to select up to three areas of infrastructure optimization and see how your views compare to your peers. Discover how to use these statistics to enhance your decision making process.
Posted: 08 Dec 2014 | Premiered: 04 Nov 2014

Hewlett-Packard Company

Don't let legacy infrastructure be your legacy
sponsored by Insight and Red Hat
VIDEO: This video explains the advantages of using open, secure infrastructure software to upgrade your legacy infrastructure, including more uptime and seamless app migration. Watch and learn why 90% of Fortune 500 companies rely on infrastructure software as the foundation for their IT infrastructure.
Posted: 19 Dec 2014 | Premiered: 23 May 2014

Insight and Red Hat

Protect Your Organization by Thinking Like an Attacker
sponsored by Core Security Technologies
VIDEO: Download this exclusive video now to learn about a solution that helps you think like an attacker while consolidating, prioritizing, and normalizing threats.
Posted: 10 Dec 2014 | Premiered: 10 Dec 2014

Core Security Technologies

Welcome to the Age of End User Computing
sponsored by VCE
VIDEO: In this video, explore how VDI initiatives have changed over the years. Discover why now is the time to deploy VDI innovations by exploring the benefits and how converged infrastructures are combining with VDI to enhance the end-user computing environment for the mobile workforce.
Posted: 11 Dec 2014 | Premiered: 11 Dec 2014

VCE
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement