IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed   
Closed Loop Security Multimedia (View All Report Types)
 
SANS Fingerprinting Threat Actors with Web Assets
sponsored by DomainTools
WEBCAST: Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.
Posted: 11 Jan 2019 | Premiered: May 31, 2018

DomainTools

Digital Transformation in Financial Services
sponsored by Onfido
VIDEO: It's obvious that traditional ways of proving our identities are no longer secure. So what are financial institutions doing about it? Tune into this webinar to learn about emerging technologies like AI, machine learning and biometrics and how they are changing the face of finance.
Posted: 27 Mar 2019 | Premiered: 01 Feb 2019

Onfido

Mastering Policy Setting and Control in the Cloud
sponsored by Forcepoint
VIDEO: Join guest presenter Andras Cser, a Forrester Vice President and Principal Analyst, as he shares recommendations for securing data and mastering policy setting in the cloud.
Posted: 17 Sep 2018 | Premiered: 31 Aug 2018

Forcepoint

Stopping the Exfiltration of Sensitive Data from the Browser
sponsored by Instart
VIDEO: In this webinar, learn how stopping the exfiltration of data from the browser can help you protect your customer's and their most sensitive data today.
Posted: 01 Apr 2019 | Premiered: 01 Apr 2019

Instart

Adopting a Zero Trust Model: Google Did It, Can You?
sponsored by Zscaler
WEBCAST: In this webinar hear from Ameet Jani, Product Manager at Google Cloud and Manoj Apte, Chief Strategy Officer at Zscaler as they talk about zero-trust security, and how to take a user and application-centric approach to application access.
Posted: 09 Oct 2018 | Premiered: Apr 27, 2018

Zscaler

Endpoint Protection Plus Webinar
sponsored by Ziften
WEBCAST: Endpoint protection can be complex and leave your organization vulnerable to attackers. This is because most endpoints aren't patched or users disable security tools. In this webcast, listen as Ziften's Roark Pollock and Logan Gilbert discuss 10 things to consider when looking at endpoint protection platforms.
Posted: 16 Apr 2019 | Premiered: Apr 16, 2019

Ziften

5 Ways Fraudsters Fake Your ID
sponsored by Onfido
VIDEO: In this webinar, PYMNTS CEO Karen Webster and Kevin Trilli, Chief Product Officer at Onfido, discuss the current trends in fraud techniques, and reveal how risk and fraud managers can utilize new technologies to catch them. Watch now to learn the most common identity document fraud techniques and how to spot them.
Posted: 01 Apr 2019 | Premiered: 25 Feb 2019

Onfido

How To Analyze and Investigate Malicious Javascript Attacks
sponsored by DomainTools
WEBCAST: The increased frequency of JavaScript attacks creates big problems when trying to protect your users. JavaScript is the top language running on the web with 80% of the top 1 million sites using it in some capacity. In this webcast, Tarik Saleh, Keith Hoodlet and Paul Asadoorian will show you several different forms of malicious JavaScript.
Posted: 10 Jan 2019 | Premiered: Jan 10, 2019

DomainTools

Modernizing Data Protection for the Digital Business
sponsored by Veritas
WEBCAST: The digital business continues to evolve. The changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. Listen to this webcast to hear experts from ESG and Veritas discuss how the right data protection tools today can prepare you for tomorrow's business demands.
Posted: 29 Mar 2019 | Premiered: Mar 29, 2019

Veritas

Brilliant Approaches for Addressing Consumer Privacy with Mobius Content Services
sponsored by ASG Technologies Group Inc
VIDEO: Download this webinar to discover the importance of maintaining compliance with GDPR and other changing consumer privacy regulations with the explosive growth of unstructured data. Explore how ASG Mobuis can help your organization protect customer data, and review 4 techniques to better customer data management.
Posted: 03 Jun 2019 | Premiered: 03 Jun 2019

ASG Technologies Group Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement