IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Hostile Threats

RSS Feed    Add to Google    Add to My Yahoo!
Hostile Threats Multimedia (View All Report Types)
 
2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

IBM Application Security Solutions Demo
sponsored by IBM
SOFTWARE DEMO: IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008

IBM

Debunking the Top 5 Misconceptions about Data Protection
sponsored by Lumension
PODCAST: Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Posted: 28 Apr 2008 | Premiered: Apr 28, 2008

Lumension

Correlating SIM Information to Detect Insider Threats
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.
Posted: 13 Jul 2007 | Premiered: Jun 18, 2007, 13:00 EDT (17:00 GMT)

Hexis Cyber Solutions Inc

Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

Tool Consolidation Webinar
sponsored by LogicMonitor
VIDEO: Running an IT environment requires many tools. In an era with emphasis speed and lowering your time-to-market, you need to consolidate your tools into a more manageable system. Watch this webinar to learn how to consolidate your tools into a single system that enables you to work faster, how you stand to benefit, and more.
Posted: 02 Nov 2017 | Premiered: 02 Nov 2017

LogicMonitor

Stop Attacks in Real-Time with Threat Intelligence
sponsored by Cisco Umbrella
VIDEO: Take a closer look into how threat intelligence can take massive amounts of information and make sense of it all. See how you can use this strategy to respond to threats in real-time before they become attacks.
Posted: 14 Aug 2017 | Premiered: 07 Mar 2017

Cisco Umbrella

3 Tips for Virtual Environments and the Modern Data Center
sponsored by Commvault
VIDEO: Your hybrid IT strategy needs to include a plan for modernizing the data center assets you own and operate, including the virtual environments that you rely on every day. Discover how to avoid adding a new management tool for every new piece of infrastructure or cloud that is adopted into the hybrid IT estate.
Posted: 11 Aug 2017 | Premiered: 31 Jul 2017

Commvault

Continuous Security on AWS
sponsored by Stelligent
VIDEO: If you are planning to deploy resources with AWS, or if you have already started and are looking to improve the security of your DevOps environments on AWS, then watch this webinar. You will learn how to infuse security validation in your development and deployment processes for continuous security on AWS.
Posted: 21 Aug 2017 | Premiered: 08 Aug 2017

Stelligent

How to Use Endpoint Analytics to Mitigate Ransomware Damage
sponsored by Splunk
WEBCAST: Watch this tutorial on how you can prevent and mitigate the effects of advanced malware like ransomware. See how endpoint analytics can detect anomalies hidden in command scripts, and stop ransomware attacks at their source.
Posted: 07 Sep 2017 | Premiered: Sep 14, 2017

Splunk
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement