IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Internal Nonhostile Unstructured Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internal Nonhostile Unstructured Threats Multimedia (View All Report Types)
 
Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

IBM Application Security Solutions Demo
sponsored by IBM
SOFTWARE DEMO: IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008

IBM

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

Debunking the Top 5 Misconceptions about Data Protection
sponsored by Lumension
PODCAST: Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Posted: 28 Apr 2008 | Premiered: Apr 28, 2008

Lumension

Correlating SIM Information to Detect Insider Threats
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.
Posted: 13 Jul 2007 | Premiered: Jun 18, 2007, 13:00 EDT (17:00 GMT)

Hexis Cyber Solutions Inc

Security in a Mobile First World
sponsored by AVST
WEBCAST: Watch this webcast to learn mobile practices that will provide your business with secure mobile communications.
Posted: 14 Feb 2017 | Premiered: Dec 15, 2016

AVST

How to Use Log Management in Incident Response
sponsored by Logentries
WEBCAST: Learn the benefit of high synergy between IT incident response and log management systems. See as experts dive into 2 use cases for leveraging logs in incident response.
Posted: 15 Mar 2017 | Premiered: Mar 15, 2017

Logentries

A CISO Perspective: Why Unified Security Solutions are a Necessity
sponsored by Forcepoint
WEBCAST: Get a solid look at the market drivers that are favoring the adoption of unified security, as well as the technical and operational blueprints for a successful unified security policy.
Posted: 17 Feb 2017 | Premiered: Feb 17, 2017

Forcepoint

UBM Dark Reading & VMware AirWatch® Webinar
sponsored by vmware airwatch
WEBCAST: In this session, we'll cover how VMware Workspace™ ONE™ can help drastically simplify the deployment of Office 365 and provide the security controls to protect your sensitive information that is stored in corporate email, OneDrive, and SharePoint.
Posted: 03 Mar 2017 | Premiered: Mar 3, 2017

vmware airwatch

The Future is Hybrid, So Therefore Your IT Should Be
sponsored by Hewlett Packard Enterprise
VIDEO: Tune into this brief video to enable your hybrid IT infrastructure with a method in which you can take advantage of both the pay-as-you-go scalability of the public cloud i, as well as the security of on premise IT. You'll discover flexible, on-demand capacity scaling to fit each of your fluctuating workloads, and more.
Posted: 25 Jan 2017 | Premiered: 29 Nov 2016

Hewlett Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement