IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Internal Hostile Structured Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internal Hostile Structured Threats Multimedia (View All Report Types)
2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

Debunking the Top 5 Misconceptions about Data Protection
sponsored by Lumension
PODCAST: Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Posted: 28 Apr 2008 | Premiered: Apr 28, 2008


IBM Application Security Solutions Demo
sponsored by IBM
SOFTWARE DEMO: IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008


Correlating SIM Information to Detect Insider Threats
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.
Posted: 13 Jul 2007 | Premiered: Jun 18, 2007, 13:00 EDT (17:00 GMT)

Hexis Cyber Solutions Inc

Your Pathway to the Composable Infrastructure
sponsored by NTT ICT
WEBCAST: In this CeBIT Conference video, hear from Paul Miller, VP of Marketing Converged Data Center Infrastructure at HPE, as he examines the performance and resource management potential of the composable infrastructure. Watch now and discover what this infrastructure approach can do for your business.
Posted: 10 Aug 2016 | Premiered: Mar 18, 2016


Above Security Delivers Customer Value
sponsored by Above Security
WEBCAST: It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.
Posted: 23 Aug 2016 | Premiered: Jun 3, 2016

Above Security

Put Your Customer First with Scalable and Adaptable Unified Infrastructure Monitoring
sponsored by CA Technologies
SOFTWARE DOWNLOAD: Are disparate monitoring systems tripping you up with convoluted complexity? Download here a free trial of CA Unified Infrastructure Management, which will empower your customer-first strategies with a scalable, adaptable unified monitoring solution—eliminating the need for disparate monitoring systems.
Posted: 13 Sep 2016 | Premiered: 13 Sep 2016

CA Technologies

Four Common Types of Private Cloud
sponsored by Commvault
VIDEO: Forrester's Dave Bartoletti discusses the four types of private cloud and their respective benefits and challenges.
Posted: 06 Oct 2016 | Premiered: 06 Oct 2016

TOPICS:  IT Management

Making the Case for Automation
sponsored by Embotics
WEBCAST: As the virtualization infrastructures' scale increases, so too does the difficulty of management. Traditional management techniques can be rendered completely ineffective by virtual data center growth, leading to uncontrolled virtual machine sprawl and wasted hardware resources. Automation may be able to solve these issues. Tune in to learn more.
Posted: 23 Aug 2016 | Premiered: Jun 8, 2016

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement