IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Insider Threat

RSS Feed    Add to Google    Add to My Yahoo!
Insider ThreatMultimedia (View All Report Types)
 
Debunking the Top 5 Misconceptions about Data Protection
sponsored by Lumension
PODCAST: Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Posted: 28 Apr 2008 | Premiered: Apr 28, 2008

Lumension

Correlating SIM Information to Detect Insider Threats
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.
Posted: 13 Jul 2007 | Premiered: Jun 18, 2007, 13:00 EDT (17:00 GMT)

Hexis Cyber Solutions Inc

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

IBM Application Security Solutions Demo
sponsored by IBM
SOFTWARE DEMO: IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008

IBM

Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

Don't Let Legacy Infrastructure Be Your Legacy
sponsored by Red Hat
VIDEO: This whitepaper explains the advantages of using Linux to upgrade your legacy infrastructure, including more uptime and seamless app migration.
Posted: 17 Oct 2014 | Premiered: 23 May 2014

Red Hat

NEC Biometrics Solutions: Enhancing the Customer Experience and Securing Endpoints
sponsored by NEC Corporation of America
WEBCAST: This webcast reveals a biometrics solution that will help identify fraud across various industries.
Posted: 02 Oct 2014 | Premiered: Oct 1, 2014

NEC Corporation of America

Evolving Security for a Maturing Cloud
sponsored by SearchSecurity.com
VIRTUAL SEMINAR: Join ISACA and TechTarget for a virtual seminar on December 9th and come away with insight into the risks, strategies, and solutions that comprise the current cloud security landscape.
Posted: 22 Oct 2014 | Premieres: 09 Dec 2014

SearchSecurity.com

How to Detect a Ransomeware Infection with AlienVault USM
sponsored by AlienVault
WEBCAST: This exclusive webcast will show you how to detect and prevent ransomware from holding your network hostage.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

AlienVault

Information-Driven Security through RSA Security Analytics 10.4 and RSA ECAT 4.0
sponsored by RSA, The Security Division of EMC
VIDEO: Learn what CISOs can do to better protect their organizations from security breaches, and why a Big Data security analytics architecture is necessary for threat detection and response.
Posted: 23 Oct 2014 | Premiered: 23 Oct 2014

RSA, The Security Division of EMC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement