Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Multimedia (View All Report Types)
26 - 50 of 133 Matches Previous Page  |  Next Page
How to Develop Mobile Applications Using Windows 10
sponsored by Pluralsight
WEBCAST: To learn what else Windows 10 can do for mobile app developers, access this webinar, which outlines the development capabilities built into the Windows 10 upgrade. View now to access guiding principles to help you get started developing Windows apps today.
Posted: 03 Sep 2015 | Premiered: Sep 3, 2015


Is Data Less Secure in the Cloud: Fact or Myth?
sponsored by Dell, Inc.
WEBCAST: In this brief webcast, Ramses Gallego, Security Strategist at Dell Software, highlights the questions that should be asked about the processes and people involved in enterprise data sharing and transfer. Click here to see why a cloud approach to data security may be the best strategy.
Posted: 25 Aug 2015 | Premiered: Aug 25, 2015

Dell, Inc.

Data Sovereignty and the Cloud
sponsored by IntraLinks, Inc
WEBCAST: In this webinar, security experts discuss exactly what the cloud means for compliance and data security.
Posted: 20 Aug 2015 | Premiered: May 21, 2015

IntraLinks, Inc

The Digital Revolution, Simplified: Reinventing Mobile App Development with the Cloud
sponsored by Oracle Corporation
WEBCAST: This webcast previews a platform for cloud-based, backend mobile services that makes app development quicker, secure and easier to deploy. View now to access a strategy that offers rich mobile analytics, enabling enterprises to make smart business decisions.
Posted: 19 Aug 2015 | Premiered: Aug 19, 2015

Oracle Corporation

"Appifying" the Enterprise Mobility Landscape
sponsored by StarMobile
WEBCAST: In this webcast, Brian Katz talks with Todd Fryburger, CEO of StarMobile, about "Appifying" your enterprise with a codeless, cloud-based solution, which transforms existing enterprise sources and legacy systems into mobile apps with a native user experience.
Posted: 10 Aug 2015 | Premiered: Aug 3, 2015


Security School: Effective Analyze SIEM Data
sponsored by
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

App Refactoring: How to Extend Application Virtualization
sponsored by StarMobile
WEBCAST: In this webcast, Todd Bryburger, CEO of Starmobile, joins Brian Madden to hash out app refactoring. They discuss how to extend application virtualization, and capitalize on all enterprise mobility spaces.
Posted: 30 Jul 2015 | Premiered: Jul 30, 2015


Best Practices for Solving Cloud Infrastructure Security Challenges
sponsored by CloudPassage
WEBCAST: This 20/20 webcast takes a look at the best practices organizations can implement to ensure cloud security, what it would take to implement those practices, and how organizations can create a framework for making the best decisions about cloud security going forward.
Posted: 16 Jul 2015 | Premiered: Jul 16, 2015


Using Open Source Intelligence to Enhance Physical Security
sponsored by Cyveillance, Inc.
WEBCAST: This webinar discusses various types of open source threat data available, and how security professionals can use it to more effectively protect organizations and executives.
Posted: 16 Jul 2015 | Premiered: Jun 18, 2015

Cyveillance, Inc.

2015 Information Security Trends: What's Next?
sponsored by Cyveillance, Inc.
WEBCAST: This webinar examines what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
Posted: 15 Jul 2015 | Premiered: Feb 26, 2015

Cyveillance, Inc.

Managing Security Threats in Today's Mobile Enterprise
sponsored by BlackBerry
WEBCAST: This video tackles the issue of mobile security and discusses how, despite the multitude of threats facing mobile devices, you can ensure your enterprise remains secure.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015


Increase Security Effectiveness with Threat Intelligence
sponsored by Cyveillance, Inc.
WEBCAST: This webcast explains the benefits of implementing an effective threat intelligence system.
Posted: 13 Jul 2015 | Premiered: Jun 30, 2015

Cyveillance, Inc.

The Day after Tomorrow: Cyber-Crisis Management at the Speed of Twitter
sponsored by Hewlett-Packard Enterprise
WEBCAST: In this video, a security expert discusses why the first 48 hours after a cyber-breach are vital to preserving your business and its reputation.
Posted: 01 Jul 2015 | Premiered: Jun 4, 2015

Hewlett-Packard Enterprise

Protection Against the Three Vectors of a Healthcare Cyberattack
sponsored by Fortinet, Inc.
WEBCAST: In this webinar, examine the top security threats and vulnerabilities facing healthcare today as well as strategies to overcome these challenges.
Posted: 12 Jun 2015 | Premiered: Jun 3, 2015

Fortinet, Inc.

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015


Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015


Multifactor Authentication Security School
sponsored by
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: This video is an in-depth, indexed demonstration of LogRhythm's award-winning SIEM 2.0 Security Intelligence Platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: Access this webcast to discover how a credit union found the SIEM that met all of its security needs, and to learn how you can follow the same process for your SIEM selection.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

The One-Man SOC: Habits of Highly Effective Security Practitioners
sponsored by AlienVault
WEBCAST: This webcast outlines the strategies you can take to build effective security operations despite being in a small team.
Posted: 12 Jun 2014 | Premiered: Jun 12, 2014


Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Overcoming the Challenges of Internal API Programs
sponsored by Intel® Services
WEBCAST: Modernizing legacy applications can be handled gracefully when the right API system is considered from the very beginning. View this webcast now to find out how to overcome cultural obstacles in implementing an internal API program, and how to present the value of having such a program.
Posted: 04 Nov 2014 | Premiered: Nov 4, 2014

Intel® Services

Security Operations Center (SOC) Essentials for the SME
sponsored by AlienVault
WEBCAST: Watch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.
Posted: 16 Jun 2014 | Premiered: Jun 16, 2014

26 - 50 of 133 Matches Previous Page    1 2 3 4 5    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement