Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   State Law  >  

Security Breach Law

RSS Feed    Add to Google    Add to My Yahoo!
Security Breach Law Multimedia (View All Report Types)
 
Serena Service Management: Free Trial
sponsored by SERENA Software, Inc.
TRIAL SOFTWARE: Serena Service Manager is an processed-based ITSM solution that keeps people and processes perfectly in sync. View now to try Pink Elephant's ITIL innovation of the year.
Posted: 05 Apr 2012 | Premiered: 05 Apr 2012

SERENA Software, Inc.

Recognize your Apps Personalities
sponsored by Hewlett Packard Enterprise
VIDEO: This brief video explains how the right applications transformation strategy can lead your enterprise to a new level of success by enabling you to categorize and profile apps based on business impact, simplify apps management, and more.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Hewlett Packard Enterprise

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

Top Trends Impacting IAM
sponsored by Simeio
WEBCAST: Watch this webcast to learn how to 'win' in cybersecurity as well as prepare for the future of identity and access management.
Posted: 15 Sep 2017 | Premiered: Sep 14, 2017

Simeio

Building and Instrumenting the Next Generation SOC
sponsored by LogRhythm, Inc.
WEBCAST: Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.
Posted: 13 Apr 2017 | Premiered: Apr 13, 2017

LogRhythm, Inc.

Interview: The Growing Security Concerns of Industrial IoT
sponsored by Bayshore Networks
WEBCAST: In this interview, industry experts Sid Snitkin and Francis Cianfrocca discuss the emerging importance of cybersecurity for industrial IoT.
Posted: 26 May 2017 | Premiered: Mar 8, 2017

Bayshore Networks

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID Global
VIDEO: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

Mobile Risks: What's Keeping CISOs up at Night
sponsored by Lookout
WEBCAST: With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.
Posted: 30 Mar 2017 | Premiered: Mar 30, 2017

Lookout

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID Global
VIDEO: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

Going Beyond Basic IAM: Protecting Identities with a Risk-Based Approach
sponsored by HID Global
VIDEO: This brief video explores two-factor authentication(2FA) to enhance IAM strategies.
Posted: 12 Jun 2015 | Premiered: 31 May 2013

HID Global

Secure Coding Practices: Avoid SQL Injection
sponsored by WhiteHat Security
WEBCAST: SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.
Posted: 26 Jul 2017 | Premiered: Dec 31, 2016

WhiteHat Security

Securely Bridge Traditional and Cloud Application Environments
sponsored by A10 Networks
WEBCAST: Access this webinar to uncover how to securely manage your ADCs, deliver secure application services across multiple environments and learn how to detect and mitigate DDoS attacks against your applications and business.
Posted: 13 Feb 2017 | Premiered: Feb 13, 2017

A10 Networks

Mobile Application Security: Discovering Leaks and Remediation
sponsored by WhiteHat Security
WEBCAST: 25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.
Posted: 27 Jul 2017 | Premiered: Jul 27, 2017

WhiteHat Security

Sleeping with the Enemy: Achieving Agility and Security with DevSecOps
sponsored by WhiteHat Security
WEBCAST: To address the faster release demands of Agile, explore DevSecOps and how it effectively improves the collaboration between development, security, and operations teams. Learn how to strive towards continuous security, integrate app security tools, address the growing role of infrastructure as code, and more.
Posted: 26 Jul 2017 | Premiered: Jun 28, 2017

WhiteHat Security

Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks

Moving from Vulnerability Management to Effective Vulnerability Response
sponsored by ServiceNow
WEBCAST: Watch this webcast to uncover how Seton Hall University went from using spreadsheets for tracking vulnerability information to a new approach to vulnerability response.
Posted: 31 Aug 2017 | Premiered: Jul 11, 2017

ServiceNow

Top 5 Requirements for Cloud-Native Application Traffic Management & Security
sponsored by A10 Networks
WEBCAST: Join expert Kamal Anand in this webinar as he unveils modern strategies for managing application security and performance across cloud environments.
Posted: 13 Feb 2017 | Premiered: Dec 14, 2016

A10 Networks

Hacking the Smartphone: A Business Email Compromise in Action
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webcast to view a live demonstration of a business email compromise or "whaling" attack in action, to help yourself better understand what you're up against. Then, find out what damages these attacks can cause, the probability of your organization being hit, and more.
Posted: 13 Oct 2017 | Premiered: May 30, 2017

Check Point Software Technologies Ltd.

IoT Botnets: The Stakes Have Changed. Have you?
sponsored by Arbor Networks
WEBCAST: The stakes have changed for IoT botnets and DDoS attacks, are you ready? In this webcast, learn how IoT devices attract DDoS security attacks. Then, find out how your organization can shift towards a more secure and reliable IoT future.
Posted: 25 Oct 2017 | Premiered: Nov 21, 2016

Arbor Networks

IoT Botnets and DDoS Attacks: The Stakes Have Changed
sponsored by Arbor Networks
WEBCAST: The stakes have changed for IoT botnets and DDoS attacks, are you ready? In this webcast, learn how IoT botnets quickly spread. Then, find out how your organization can shift towards a more secure and reliable IoT future.
Posted: 24 Oct 2017 | Premiered: Apr 6, 2017

Arbor Networks

Stop Attacks in Real-Time with Threat Intelligence
sponsored by Cisco Umbrella
VIDEO: Take a closer look into how threat intelligence can take massive amounts of information and make sense of it all. See how you can use this strategy to respond to threats in real-time before they become attacks.
Posted: 14 Aug 2017 | Premiered: 07 Mar 2017

Cisco Umbrella

Analytical Stories: How I Learned to Stop Worrying and Respond to Threats
sponsored by Splunk
WEBCAST: This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.
Posted: 13 Oct 2017 | Premiered: Sep 26, 2017

Splunk

Key Features To Consider When Deciding On A NGFW Technology
sponsored by Forcepoint
WEBCAST: There are 3 main drivers for a NGFW technology deployment: integration with security workflow, total cost of ownership, and security effectiveness. In this NSS Labs webcast, learn market trends for NGFWs and uncover key features to consider when selecting an NGFW technology.
Posted: 17 Feb 2017 | Premiered: Feb 17, 2017, 01:01 EST (06:01 GMT)

Forcepoint

15 Essential DNS and DNSSEC Monitoring Tests
sponsored by Men and Mice
WEBCAST: Don't fall short on your Internet security strategy. In this webcast, you can learn how to use 15 essential DNS and DNSSEC monitoring tests to help your organization detect concerns before your network performance is impacted.
Posted: 03 Nov 2017 | Premiered: Nov 10, 2016

Men and Mice

EU General Data Protection Regulation with MarkLogic
sponsored by MarkLogic
VIDEO: This webcast covers the importance of understanding the GDPR, and the steps to take to achieve and manage compliance, with the use of a database that integrates data better, faster, with less cost. Listen in to learn about the steps your organization should take to ensure compliance, and how you stay on top of the process along the way.
Posted: 21 Nov 2017 | Premiered: 15 Nov 2017

MarkLogic

What's Driving Ransomware Attacks and How Should You Respond?
sponsored by Cisco Umbrella
WEBCAST: VP of Research at Gartner and leading authority on endpoint and server protection strategies, Peter Firstbrook, and Cisco Umbrella's CTO, Dan Hubbard, address the explosion of ransomware in the market and the simplest way for security practitioners to stay ahead of these attacks in this webcast.
Posted: 30 May 2017 | Premiered: Dec 30, 2016

Cisco Umbrella

SiliconANGLE Spotlight: HyTrust
sponsored by HyTrust
VIDEO: Join Eric Chiu, the founder and president of HyTrust, a security, compliance and control IT infrastructure company, to learn how this enterprise was founded, what it specializes in, and why you should care.
Posted: 27 Jul 2017 | Premiered: 27 Jul 2017

HyTrust
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement