IT Management  >   Systems Operations  >   Security  >  

Virus Threats

RSS Feed    Add to Google    Add to My Yahoo!
Virus Threats Multimedia (View All Report Types)
 
The ROI of AppSec: Getting your Money's Worth from your AppSec Program
sponsored by Veracode, Inc.
WEBCAST: Access this webcast to gain a better understanding of the impact of application security on the end-to-end software development value chain. Then, discover how much it really cost to fix security vulnerabilities in relation to application development.
Posted: 16 Jan 2018 | Premiered: Jan 16, 2018

Veracode, Inc.

SecOps Webinar: Seven Essentials for Effective Vulnerability Response
sponsored by ServiceNow
WEBCAST: The 2016 Verizon Data Breach Investigation Report reveals that the top 10 vulnerabilities accounted for 85% of successful exploit traffic. This webinar reveals 7 essentials for effective vulnerability response.
Posted: 31 Aug 2017 | Premiered: Aug 31, 2017

ServiceNow

Intel Core vPro Processor Family Animations: More Secure, Manageable, and Responsive
sponsored by Intel
VIRTUAL ENVIRONMENT: In this animation, discover how a hardware-assisted approach to enterprise management can help you remotely secure your PC fleet. Learn how you can reduce deskside visits, boost energy efficiency, remotely protect corporate data from theft and loss, and more – click through now to get started.
Posted: 28 Dec 2012 | Premiered: 28 Dec 2012

Intel

Navigating Security in a Mobile World
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014

Cisco Systems, Inc.

Webinar: 20 Critical Controls for Cyber Defense
sponsored by ISACA
WEBCAST: Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)

ISACA

Mobile Device Security School
sponsored by IBM
VIRTUAL ENVIRONMENT: This expert mobile device security school takes you through everything you need to know about mobile security, from best practices to what kind of threats you can expect to find in the future.
Posted: 04 Oct 2013 | Premiered: 04 Oct 2013

IBM

How to Predict, Detect, and Protect Against Mobile Cyber Attacks
sponsored by Skycure
WEBCAST: This webcast explores the current enterprise mobility management (EMM) strategies available as well as the benefits of implementing active threat detection to stop malware attacks as they come into the enterprise. Download now to learn how to secure all endpoints within the organizational walls and beyond.
Posted: 04 Dec 2015 | Premiered: Oct 28, 2015

Skycure

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM

More Accurate Security Anomaly Detection
sponsored by Prelert
WEBCAST: Discover real-life accounts that describe how machine learning analytics can cut down on false positives and help you zero-in on the actual threats to your data and networks. Learn how to make your enterprise security more effective while making your job a little easier.
Posted: 25 Mar 2015 | Premiered: Mar 25, 2015

Prelert

Elevate's CISO Explains Why He Switched Managed Security Providers
sponsored by MASERGY
VIDEO: One CISO was unhappy with the level of service from their managed security provider and decided to look for a new one. Watch this quick, 2-minute video to learn how this CISO compared two competing managed security providers, why he recommends doing side-by-side comparisons, and why he chose to go with the provider he did.
Posted: 31 May 2016 | Premiered: 25 May 2016

MASERGY
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement