Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Multimedia (View All Report Types)
1 - 25 of 128 Matches Previous Page  |  Next Page
How to Develop Mobile Applications Using Windows 10
sponsored by Pluralsight
WEBCAST: In this webinar, Windows Platform Development MVP and Pluralsight author Lars Klint outlines the Windows 10 upgrade and what it brings to bear on developing enterprise mobile applications, including benefits and services Windows offers as an app developer platform.
Posted: 03 Sep 2015 | Premiered: Sep 3, 2015

Pluralsight

Using Big Data for Data Security
sponsored by Splunk
WEBCAST: This webcast demonstrates how to accurately determine the threat activity your organization faces.
Posted: 02 Sep 2015 | Premiered: Jan 16, 2014

Splunk

Mobile security policies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn about applicable security policies that you can implement to neutralize today's biggest Android threats.
Posted: 01 Sep 2015 | Premiered: 19 Aug 2015

SearchSecurity.com

Using Big Data and Behavioral Analytics to Enhance Cybersecurity
sponsored by Splunk
WEBCAST: Demetrios Lazarikos, IT security strategist and thought leader, addresses the growing importance of data security in enterprise, financial and healthcare industries. Demetrios also highlights how behavioral analytics, in combination with big data tools, can be used by IT security personnel to establish alerts and enhance security.
Posted: 01 Sep 2015 | Premiered: Jan 18, 2014

Splunk

How Well Does SIEM Actually Secure Your Organization?
sponsored by Splunk
WEBCAST: This brief webcast examines how SIEMs only alert you of security threats when an attack is detected, but not when they sneak past your perimeter security.
Posted: 31 Aug 2015 | Premiered: Jan 17, 2014

Splunk

Does the Cloud Fit into Hybrid Data Environments?
sponsored by Dell, Inc.
WEBCAST: In this webcast, Shawn Rogers, Chief Research Officer in the Information Management Group at Dell, examines an advanced data analytics solution that enterprises can leverage in the cloud for enhanced data learning. View now to see how you can merge your enterprise cloud with others.
Posted: 31 Aug 2015 | Premiered: Aug 31, 2015

Dell, Inc.

Success in the Digital Banking Revolution: How to Securely Go Mobile
sponsored by HID
WEBCAST: In the first part of this two-part webcast, Christy Serrato, in Solutions Marketing at HID Global, addresses the challenges organizations face in the new era of digital banking, as well as discusses the barriers to mobile banking adoption, including coping with outdated legacy software integration.
Posted: 24 Aug 2015 | Premiered: Aug 24, 2015

HID

Auditing Your Data for Insider Threats
sponsored by Splunk
WEBCAST: This webcast discusses how, with good network monitoring tools, you can find and detect even the subtlest insider threats.
Posted: 24 Aug 2015 | Premiered: May 14, 2015

Splunk

Threats Will Get In: What Will You Do About Them?
sponsored by Splunk
VIDEO: This brief video explains the necessity of adjusting your security strategy to focus more on detecting and mitigating threats.
Posted: 21 Aug 2015 | Premiered: 02 Jul 2014

Splunk

Data Sovereignty and the Cloud
sponsored by IntraLinks, Inc
WEBCAST: In this webinar, security experts discuss exactly what the cloud means for compliance and data protection.
Posted: 20 Aug 2015 | Premiered: May 21, 2015

IntraLinks, Inc

Why Layered Security May Not Be Enough
sponsored by Malwarebytes Corporation
PODCAST: This podcast explores why the typical layered security approach is full of holes and outlines steps you can take fill these holes.
Posted: 20 Aug 2015 | Premiered: Jul 27, 2015


Your Layered Security Defenses are Riddled with Holes… Here's what to do instead
sponsored by Malwarebytes Corporation
WEBCAST: In this webcast, security experts discuss the holes in the typical layered security approach and outline steps you can take to make your security program truly successful.
Posted: 19 Aug 2015 | Premiered: Jul 27, 2015


Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
PODCAST: This podcast discusses ways to mitigate zero-day vulnerabilities and to detect subtle zero-day attacks.
Posted: 19 Aug 2015 | Premiered: Jul 30, 2015


Enterprise MAM Takes Center Stage: The Next Chapter in Mobile Strategy
sponsored by Apperian, Inc.
WEBCAST: In this webcast, Gartner Research Director Chris Silva and Steven Wheat, Chief Information Technology Architect at Emory Healthcare, look at how organizations use mobile application management to securely deliver mobile apps. Tune in now to key into these can't-miss MAM strategies.
Posted: 17 Aug 2015 | Premiered: Aug 17, 2015

Apperian, Inc.

Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
WEBCAST: This webcast discusses specific ways to address zero-day risks and fight exploit attempts.
Posted: 17 Aug 2015 | Premiered: Jul 31, 2015


3 Guidelines to Establishing Your Code Confidence
sponsored by Rogue Wave Software
WEBCAST: Navigating the day-to-day issues of automotive software development can be overwhelming, but with little effort it can be easily managed. This webinar will explore how to deliver secure, compliant, and defect-free software.
Posted: 11 Aug 2015 | Premiered: Aug 11, 2015

Rogue Wave Software

"Appifying" the Enterprise Mobility Landscape
sponsored by StarMobile
WEBCAST: In this webcast, Brian Katz talks with Todd Fryburger, CEO of StarMobile, about "Appifying" your enterprise with a codeless, cloud-based solution, which transforms existing enterprise sources and legacy systems into mobile apps with a native user experience.
Posted: 10 Aug 2015 | Premiered: Aug 3, 2015

StarMobile

App Refactoring: How to Extend Application Virtualization
sponsored by StarMobile
WEBCAST: In this webcast, Todd Bryburger from StarMobile joins Brian Madden to discuss app refactoring, and how to extend application virtualization to capitalize on all enterprise mobility spaces.
Posted: 30 Jul 2015 | Premiered: Jul 30, 2015

StarMobile

Best Practices for Solving Cloud Infrastructure Security Challenges
sponsored by CloudPassage
WEBCAST: This 20/20 webcast takes a look at the best practices organizations can implement to ensure cloud security, what it would take to implement those practices, and how organizations can create a framework for making the best decisions about cloud security going forward.
Posted: 16 Jul 2015 | Premiered: Jul 16, 2015

CloudPassage

Using Open Source Intelligence to Enhance Physical Security
sponsored by Cyveillance, Inc.
WEBCAST: This webinar discusses various types of open source threat data available, and how security professionals can use it to more effectively protect organizations and executives.
Posted: 16 Jul 2015 | Premiered: Jun 18, 2015

Cyveillance, Inc.

2015 Information Security Trends: What's Next?
sponsored by Cyveillance, Inc.
WEBCAST: This webinar examines what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
Posted: 15 Jul 2015 | Premiered: Feb 26, 2015

Cyveillance, Inc.

Understanding today’s information security threats
sponsored by Dell SecureWorks
PODCAST: This podcast can help you gain the understanding you need to secure your organization by describing what threats your business faces and how you can combat them.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015

Dell SecureWorks

Point of Sale Insecurity: A Threat to Your Business
sponsored by SurfWatch Labs
WEBCAST: This webcast discusses the risks facing PoS machines and what you can do to make sure yours are secured..
Posted: 13 Jul 2015 | Premiered: Jun 9, 2015

SurfWatch Labs

You've Been Breached: Now What Do You Do?
sponsored by Dell SecureWorks
PODCAST: This podcast features tips on how to remedy a security breach before it can do lasting harm on your organization.
Posted: 13 Jul 2015 | Premiered: Jul 13, 2015

Dell SecureWorks

Increase Security Effectiveness with Threat Intelligence
sponsored by Cyveillance, Inc.
WEBCAST: This webcast explains the benefits of implementing an effective threat intelligence system.
Posted: 13 Jul 2015 | Premiered: Jun 30, 2015

Cyveillance, Inc.
1 - 25 of 128 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement