Vertical Industries  >   Financial Services Industry  >  

Commodity Investing Industry

RSS Feed    Add to Google    Add to My Yahoo!
Commodity Investing Industry Reports
Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: Access this webcast to discover how a credit union found the SIEM that met all of its security needs, and to learn how you can follow the same process for your SIEM selection.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Penetration Testing Services Data Sheet
sponsored by IBM
DATA SHEET: Since high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is required. This resource details a security service that will document your unique set of requirements for determining risk and create a custom tool to recommend a testing profile for each of your targets.
Posted: 22 Sep 2016 | Published: 29 Jul 2016


Threat Analytics Module: Gain Visibility Into Malicious User Activity
sponsored by LogRhythm, Inc.
PRODUCT OVERVIEW: User accounts have long been one of the most prevalent attack vectors for advanced attacks and data breaches. This product overview highlights a threat analytics module that can secure your organization with immediate visibility into suspicious or malicious user activity indicative of an attack.
Posted: 12 Oct 2016 | Published: 31 Aug 2015

LogRhythm, Inc.

DNS Co-Founder Discusses the Need for a More Secure DNS
sponsored by Dyn
EGUIDE: This expert e-guide features a Q&A with Paul Mockapetris, inventor of the Domain Name System, where he discusses the immediate need for a more secure DNS and Internet. Additionally, learn what security risks IoT will bring to DNS.
Posted: 24 Oct 2016 | Published: 20 Oct 2016


Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.

Evolving Security Technologies Present New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013


Planning a Career Path in Cybersecurity
sponsored by Global Knowledge
WHITE PAPER: The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Global Knowledge

Register Free to Visit Infosecurity Europe - 19th - 21st April 2011
sponsored by Infosecurity Europe
EVENT: Europe's No. 1 Information Security event, with an unrivalled free education programme, exhibitors showcasing new and emerging technologies and offering practical and professional expertise.
Posted: 09 Feb 2011 | Published: 08 Feb 2011

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement