IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed    Add to Google    Add to My Yahoo!
Threat Mitigation Multimedia (View All Report Types)
 
How to Steal 60 Million Dollars in 60 Seconds
sponsored by Hewlett-Packard Limited
WEBCAST: This webcast outlines key tactics used by cybercriminals to subvert your system and steal your hard-earned money.
Posted: 11 Feb 2014 | Premiered: Dec 16, 2013

Hewlett-Packard Limited

Case Study: A New Approach to Network Monioring and Security
sponsored by Gigamon
VIDEO: This case study introduces a new approach used by the University of Glasgow to improve network visibility and security wihout adding on appliances. View now to learn how to detect and remedy infected endpoints before disaster occurs and if this strategy if right for your organization.
Posted: 13 Apr 2015 | Premiered: 25 Feb 2015

Gigamon

Managing SSL/TLS Vulnerabilities and Virtual Patching Best Practices
sponsored by Trend Micro
WEBCAST: Access this webinar to learn the options you have to better manage vulnerabilities and discover new methods to adapt and mitigate known and unknown threats.
Posted: 08 May 2015 | Premiered: May 12, 2015

Trend Micro

Securing Data After a Hack
sponsored by Hewlett-Packard Limited
WEBCAST: This brief video explores how one company learned from a past security breach and now is focusing more time and money towards system security.
Posted: 13 Feb 2014 | Premiered: Oct 3, 2013

Hewlett-Packard Limited

Mitigate Software Vulnerabilities with Virtual Patching
sponsored by Trend Micro
WEBCAST: This webcast discusses best practices for implementing virtual patching in a way that optimizes security without causing any system downtime.
Posted: 11 May 2015 | Premiered: May 11, 2015

Trend Micro

Financial Services Security: Recent Attacks, Trends, and Best Practices
sponsored by Absolute Software
WEBCAST: This presentation discusses some of the recent high-profile breaches and uses them to draw conclusions about overall cybersecurity trends and best practices for the financial industry.
Posted: 01 May 2015 | Premiered: May 1, 2015

Absolute Software

Insight into Hacker Economics
sponsored by Juniper Networks, Inc.
WEBCAST: This webcasts takes a closer look at the current and historical trneds in crybercrime methods and tools and how the market is maturing.
Posted: 26 Mar 2015 | Premiered: Mar 27, 2014

Juniper Networks, Inc.

Building a Layered Defense Against Data Breaches
sponsored by Absolute Software
WEBCAST: This webcast explores how a tri-layered security strategy can help protect you from a continuous barrage of malware. View now to learn why encryption is not enough to protect data and why endpoint security can pick up where traditional perimeter defenses leave off.
Posted: 05 May 2015 | Premiered: Dec 15, 2014

Absolute Software

Join SafeNet Authentication Free Trial
sponsored by SafeNet Asia Ltd
TRIAL SOFTWARE: Experience low-maintenance and low-cost authorization controls by downloading your free 30-day trial of SafeNet Authentication Service, a cloud-based solution featuring token and self-service capabilities.
Posted: 10 Jan 2014 | Premiered: 10 Jan 2014

SafeNet Asia Ltd

2013 Cost of Cyber Crime – UK, France and Germany Findings
sponsored by Hewlett-Packard Limited
WEBCAST: Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

Hewlett-Packard Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement