IT Management  >   Systems Operations  >   Security  >  

Virus Threats

RSS Feed    Add to Google    Add to My Yahoo!
Virus ThreatsMultimedia (View All Report Types)
 
SearchSecurity.com University: Web-bourne Malware
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This lesson examines trends in Web-borne malware, including contemporary attacker and malware trends, and recent cutting-edge attack methods, and details the technologies and tactics enterprises can put in place to achieve "quick wins" to reduce malware risk and long-term strategies to harden browsers, enhance detection and educate users.
Posted: 14 Jan 2014 | Premiered: 15 Jan 2014

SearchSecurity.com

Automated Removal of Advanced Threats: Defending Your Enterprise with Bob Gourley
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This report from CTOvision introduces automated threat removal, an economical defense method that enables businesses to have an "invisible workforce" working around the clock to ward off attackers.
Posted: 14 Jul 2014 | Premiered: Jun 16, 2014

Hexis Cyber Solutions Inc

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Demo: RSA Security Analytics: SIEM Use Case
sponsored by RSA
VIDEO: Watch this demo to discover RSA Security Analytics 10.4 in action as it solves a complex security information and event management (SIEM) use case.
Posted: 29 Oct 2014 | Premiered: 29 Oct 2014

RSA

SearchSecurity.com University- Next-generation firewalls: Breaking through the hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 06 Dec 2013 | Premiered: 10 Dec 2013

SearchSecurity.com

Are You Fully Prepared for Shellshock?
sponsored by Dell Software
WEBCAST: Join this webinar for technical insight into Shellshock, and learn what you can do to protect networks and Linux-based devices from attacks.
Posted: 25 Nov 2014 | Premiered: Nov 25, 2014

Dell Software

Beating Back Malicious Mobile Apps Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson will help your organization establish and enforce policy and deploy technology that will beat back malicious mobile apps.
Posted: 18 Nov 2013 | Premiered: 18 Nov 2013

SearchSecurity.com

Take The Worry Out Of Patch Management: Shavlik Protect
sponsored by Shavlik Technologies
WEBCAST: This exclusive webcast explores the importance of broadening patch management beyond just focusing on your operating systems.
Posted: 10 Oct 2014 | Premiered: May 7, 2014

Shavlik Technologies

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement