IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Unstructured Threats

RSS Feed    Add to Google    Add to My Yahoo!
Unstructured Threats Multimedia (View All Report Types)
 
Debunking the Top 5 Misconceptions about Data Protection
sponsored by Lumension
PODCAST: Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Posted: 28 Apr 2008 | Premiered: Apr 28, 2008

Lumension

Correlating SIM Information to Detect Insider Threats
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.
Posted: 13 Jul 2007 | Premiered: Jun 18, 2007, 13:00 EDT (17:00 GMT)

Hexis Cyber Solutions Inc

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

VPN Authentication by BlackBerry
sponsored by BlackBerry
WEBCAST: This webcast introduces VPN Authentication by BlackBerry, which simplifies users' access to the organization's VPN without compromising security.
Posted: 22 Jan 2015 | Premiered: Nov 28, 2014

BlackBerry

3 Ways to Secure Your Critical Data in the Cloud
sponsored by CipherCloud
WEBCAST: This webcast exposes the three steps needed to secure data in the cloud: cloud discovery, data discover, and data protection.
Posted: 24 Sep 2014 | Premiered: Sep 24, 2014

CipherCloud

Gain and Remain in Control of Your Cloud & Virtual Infrastructure
sponsored by Insight and Red Hat
VIDEO: Watch this exclusive video to uncover a cloud management system that will help you reel in these complexities and run your virtual or cloud environment with a comprehensive, real-time, policy based management strategy.
Posted: 19 Dec 2014 | Premiered: 19 Mar 2014

Insight and Red Hat

Thrive, Survive or Perish - Compute Economics
sponsored by Hewlett-Packard Company
WEBCAST: View this in-depth webcast to learn about the "new style" of IT and how you can leverage your staff to overcome the pressures and obstacles presented today. Watch now to discover the path to impact business performance around workforce productivity, business trends and intelligence, and customer acquisition and loyalty in the digital age.
Posted: 07 Jan 2015 | Premiered: Oct 22, 2014

Hewlett-Packard Company

Security University: Mobile Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Lisa Phifer explores innovative approaches to achieve secure mobility, from EMM and BYOA to enterprise cloud and dual persona.
Posted: 11 Nov 2014 | Premiered: 14 Nov 2014

SearchSecurity.com

Thrive, Survive or Perish - How Compute Economics Changes the Rules of Business
sponsored by Hewlett-Packard Company
WEBCAST: View this in-depth webcast to learn about the "new style" of IT and how you can leverage your staff to overcome the pressures and obstacles presented today. Watch now to discover the path to impact business performance around workforce productivity, business trends and intelligence, and customer acquisition and loyalty in the digital age.
Posted: 05 Dec 2014 | Premiered: Oct 22, 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement