Software  >  

Malicious Logic

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Logic Multimedia (View All Report Types)
 
End Point Lightboard
sponsored by Palo Alto Networks
VIDEO: In this video, you will see the battle security pros fight every day and what new tools are needed to stop hackers.
Posted: 11 Feb 2016 | Premiered: 31 Aug 2015

Palo Alto Networks

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

There Will Be Attacks: Prepare Your Email Defenses
sponsored by Mimecast
WEBCAST: Your organization can't tolerate any email downtime. Learn how to prevent damages to money, your reputation, and business operations with the right arsenal of email security tools.
Posted: 02 Jun 2016 | Premiered: Jun 2, 2016

Mimecast

Enterprise Mobile Security for Dummies
sponsored by Skycure
WEBCAST: In this webcast, you'll gain insight into the confusing and evolving mobile security landscape. View now to learn a step-by-step guide to achieve holistic mobile security and review a checklist for evaluating mobile security strategies.
Posted: 07 Dec 2015 | Premiered: Mar 19, 2015

Skycure

Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST: This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Threat Track Security

Inside IT: Stopping Security Threats in an Ever-Changing Landscape
sponsored by Intel
PODCAST: In this podcast, Intel's CISO Malcolm Harkins discusses the ever-changing security and threat landscapes and explains why adding advanced protection to your current systems is crucial to staying secure.
Posted: 27 Dec 2012 | Premiered: Dec 27, 2012

Intel

Tearing Down the Fortress to Better Protect the Enterprise
sponsored by BlueCoat
WEBCAST: Check out this webcast and learn about the 5 key layers of malware defense that can provide multi-layered protection for your company.
Posted: 13 Oct 2008 | Premiered: Oct 13, 2008

BlueCoat

Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WEBCAST: Join Cisco's Cyber Security Specialist, Charles Herring, to learn how network behavioral anomaly detection (NBAD) and deep visibility through NetFlow can be used to quickly alert administrators to these violations.
Posted: 18 Feb 2016 | Premiered: Jan 27, 2016

Lancope

The Threat Landscape: A View from the Inside
sponsored by Dell SecureWorks
WEBCAST: In this webcast, join Lee Lawson, head of the Security Testing and Response teams for EMEA, as he discusses today’s cyber threats facing organisations in the UK and across the globe.
Posted: 12 Oct 2011 | Premiered: Oct 12, 2011

Dell SecureWorks

How to Limit the Risk of Attack on your XP Assets
sponsored by AlienVault
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement