IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Insider Attacks

RSS Feed    Add to Google    Add to My Yahoo!
Insider Attacks Multimedia (View All Report Types)
Correlating SIM Information to Detect Insider Threats
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.
Posted: 13 Jul 2007 | Premiered: Jun 18, 2007, 13:00 EDT (17:00 GMT)

Hexis Cyber Solutions Inc

Debunking the Top 5 Misconceptions about Data Protection
sponsored by Lumension
PODCAST: Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Posted: 28 Apr 2008 | Premiered: Apr 28, 2008


2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

IBM Application Security Solutions Demo
sponsored by IBM
SOFTWARE DEMO: IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008


Mobile Devices, Wearables and the Future of Identity
sponsored by Centrify Corporation
WEBCAST: This webcast describes how the mobile devices we carry can help boost your enterprise's identity management and authentication security.
Posted: 22 Oct 2015 | Premiered: Apr 2, 2015

Centrify Corporation

The Cloud is Casting a Shadow Over IT
sponsored by Centrify Corporation
WEBCAST: In the following webinar, join Chris Christiansen, Program Vice President for IDC's Security Product and Services Group, and Chris Webber, Security Strategist from Centrify, as they discuss shadow IT and the many problems it can bring to the table. Tune in now and uncover insights into how to overcome these issues.
Posted: 23 Oct 2015 | Premiered: Oct 23, 2015

Centrify Corporation

Soni Jiandani on App Delivery and Virtualization
sponsored by Cisco Systems, Inc and Citrix
VIDEO: In this video, tune into Soni Jiandani as she discusses how one strategic partnership is amplifying application delivery and virtualization.
Posted: 02 Nov 2015 | Premiered: 25 Sep 2014

Cisco Systems, Inc and Citrix

Automate Your Enterprise Apps to Ensure Secure Mobile Data Access
sponsored by Citrix
WEBCAST: In this webcast, Security Strategists Stacy Bruzek Banerjee and Kurt Roemer share their advice on how and where to protect the enterprise data that matters. Tune in to receive guidance on automating your enterprise data and apps, so that your people can access sensitive data when—and where—they need it.
Posted: 28 Oct 2015 | Premiered: Oct 28, 2015


Single-Source, Comprehensive Technical Support for Hardware Maintenance
sponsored by IBM
VIDEO: This video discusses how third party support can consolidate your hardware to a couple vendors that only need maintenance a few times a year. Watch now to discover how this service can streamline your maintenance needs with a single point of contact, allowing you to predict your hardware support requirements and weigh risks ahead of time.
Posted: 11 Nov 2015 | Premiered: 29 Sep 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement