Standards  >   Security Standards  >  

Wi-Fi Protected Access

RSS Feed    Add to Google    Add to My Yahoo!
Wi-Fi Protected Access Multimedia (View All Report Types)
 
AVG Content Filtering - Now Get 50% Off on Any 12- or 24-Month Subscription
sponsored by AVG Technologies
PRODUCT DEMO: This complimentary IT downloads lets you try a cloud content filtering solution for yourself.
Posted: 22 Dec 2014 | Premiered: 22 Dec 2014

AVG Technologies

ISACA PCI Compliance Symposium
sponsored by Intel
WEBCAST: As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.
Posted: 04 Apr 2011 | Premiered: Jan 25, 2011

Intel

PCI DSS v3.0: How to Adapt your Compliance Strategy
sponsored by AlienVault
WEBCAST: With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.
Posted: 20 Dec 2013 | Premiered: Dec 20, 2013

AlienVault

Stealthy Threats: Driving a New Approach to Security Video
sponsored by Intel
WEBCAST: View this Webcast and uncover the steps to a new approach to security. Today, the threat landscape is more dangerous than ever before, so make sure you have the right security to mitigate the risks.
Posted: 01 Oct 2012 | Premiered: Oct 1, 2012

Intel

Security Virtual Jam Session: The Secured Enterprise
sponsored by IBM
WEBCAST: Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders.
Posted: 08 Feb 2008 | Premiered: Feb 21, 2008, 11:00 EST (16:00 GMT)

IBM

Security University: Cloud Security
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: Learn strategies for how to positively influence the security of cloud computing projects in your organization.
Posted: 31 Oct 2013 | Premiered: 05 Nov 2013

SearchCloudSecurity.com

Video - Vulnerability Management in a Web 2.0 World
sponsored by Lumension
VIDEOCAST: Lumension Security's Sr. Director of Solutions and Strategy, Don Leatham, discusses Vulnerability Management challenges in a Web 2.0 world, and how to defend against these threats.
Posted: 28 Jan 2009 | Premiered: Jan 28, 2009

Lumension

Secure Cloud Access Reference Architecture & Use Model
sponsored by Intel
WEBCAST: This session presents a simple use case and reference architecture and layers how each of these standards & technologies can play a role: AuthN: SAML, Open ID, OAuth, Pledge (OTP), AuthZ: XACML, Platform Connectors: IdM & Provisioning, Client & Server: TXT, IPT (Identity Protection).
Posted: 28 Feb 2011 | Premiered: Mar 17, 2011, 14:00 EDT (18:00 GMT)

Intel

The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009

Lumension

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple
sponsored by Lumension
VIRTUAL SEMINAR: Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.
Posted: 12 Sep 2012 | Premiered: 25 Sep 2012

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement