IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
VulnerabilitiesMultimedia (View All Report Types)
 
Case Study: SEEK Protects Sites with Web Application Security Firewall
sponsored by Imperva
WEBCAST: This case study features one organization's experience with a Web application security solution that tackled technical, logic, denial-of-service, and fraud attacks to reduce risk and save its reputation.
Posted: 21 Feb 2014 | Premiered: Mar 19, 2013

Imperva

Podcast: Emerging Security Threats: Know Your Enemy in 2014
sponsored by Imperva
PODCAST: Enterprises must protect themselves from sophisticated attacks that can escape notice by host-based detection systems and steal millions. Johanne B. Ullrich, dean of research for the SANS Technology Institute, shows you how.
Posted: 03 Mar 2014 | Premiered: Feb 24, 2014

Imperva

How to Steal 60 Million Dollars in 60 Seconds
sponsored by Hewlett-Packard Limited
WEBCAST: This webcast outlines key tactics used by cybercriminals to subvert your system and steal your hard-earned money.
Posted: 11 Feb 2014 | Premiered: Dec 16, 2013

Hewlett-Packard Limited

Chalk Talk: NetIQ Cloud Access
sponsored by NetIQ
WEBCAST: This webcast highlights a cloud access management solution that easily integrates with your user directory and Microsoft Office 365. Learn how you can seamlessly manage user provisioning to virtualized business applications and resources.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

NetIQ

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID

Join SafeNet Authentication Free Trial
sponsored by SafeNet Asia Ltd
TRIAL SOFTWARE: Experience low-maintenance and low-cost authorization controls by downloading your free 30-day trial of SafeNet Authentication Service, a cloud-based solution featuring token and self-service capabilities.
Posted: 10 Jan 2014 | Premiered: 10 Jan 2014

SafeNet Asia Ltd

This Month in the Threat Webscape -- August 2009
sponsored by Websense, Inc.
VIDEO: The Websense Security Labs Team provides a review of threats occurring during the month of August 2009. Highlighted is the massive DDoS (Distributed Denial of Service) attack on Twitter, Google Blogger, LiveJournal, and Facebook centered around 1 person: Cyxymu, a pro-Georgia blogger who is an active critic of Moscow's politics.
Posted: 08 Oct 2009 | Premiered: 08 Sep 2009

Websense, Inc.

Trial download: IBM Rational AppScan
sponsored by IBM
TRIAL SOFTWARE: Download this free trial to experience how IBM Rational AppScan software helps you quickly and easily pinpoint Web application vulnerabilities.
Posted: 29 Jul 2008 | Premiered: 29 Jul 2008

IBM

Disclosures 2012 - The Vulnerability of Publicly Traded Companies
sponsored by Veracode, Inc.
WEBCAST: In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.
Posted: 24 May 2012 | Premiered: May 23, 2012

Veracode, Inc.

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement