IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed    Add to Google    Add to My Yahoo!
Threat Mitigation Multimedia (View All Report Types)
 
Anti-Malware Tailored to the Needs of Mobile Devices
sponsored by Malwarebytes Corporation
VIDEO: In this brief video, learn about the capabilities of mobile anti-malware and how a mobile anti-malware program could protect you.
Posted: 06 May 2015 | Premiered: 15 Oct 2013


Emerging Threats: New Techniques and Countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual classroom, you'll find videos, white papers, and expert advice that can help you prepare for the next wave of cybercrime.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015

SearchSecurity.com

Auditing Your Data for Insider Threats
sponsored by Splunk
WEBCAST: This webcast discusses how, with good network monitoring tools, you can find and detect even the subtlest insider threats.
Posted: 24 Aug 2015 | Premiered: May 14, 2015

Splunk

Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
PODCAST: This podcast discusses ways to mitigate zero-day vulnerabilities and to detect subtle zero-day attacks.
Posted: 19 Aug 2015 | Premiered: Jul 30, 2015


Insight into Hacker Economics
sponsored by Juniper Networks, Inc.
WEBCAST: This webcasts takes a closer look at the current and historical trneds in crybercrime methods and tools and how the market is maturing.
Posted: 26 Mar 2015 | Premiered: Mar 27, 2014

Juniper Networks, Inc.

Securing Data After a Hack
sponsored by Hewlett-Packard Limited
WEBCAST: This brief video explores how one company learned from a past security breach and now is focusing more time and money towards system security.
Posted: 13 Feb 2014 | Premiered: Oct 3, 2013

Hewlett-Packard Limited

Enterprise Security and your Technology
sponsored by Hewlett-Packard Company
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett-Packard Company

6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault

Mobile Device Security School
sponsored by IBM
VIRTUAL ENVIRONMENT: This expert mobile device security school takes you through everything you need to know about mobile security, from best practices to what kind of threats you can expect to find in the future.
Posted: 04 Oct 2013 | Premiered: 04 Oct 2013

IBM

Navigating Security in a Mobile World
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement