IT Management  >   Systems Operations  >  

Computer Security

RSS Feed   
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 

Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Computer Security Multimedia (View All Report Types)
 
Webinar: Top 6 Security Needs for APIs and Serverless Apps
sponsored by Data Theorem
WEBCAST: In this webinar, discover the top 6 API security needs for APIs and apps across serverless platforms such as AWS Lambda, Google Cloud Functions and Azure Functions.
Posted: 12 Apr 2019 | Premiered: Apr 12, 2019

Data Theorem

Holistic Privacy Readiness
sponsored by Okera
WEBCAST: In this Okera webcast, learn about the requirements for holistic privacy readiness and the best practices for S3 and azure data lakes.
Posted: 02 Aug 2019 | Premiered: Aug 2, 2019

Okera

Automated Threat Detection, Threat Hunting, and Response Platform
sponsored by Fidelis
WEBCAST: In this on-demand demo, see how Fidelis Elevate can help your organization shift from a prevention-focused approach to one that prioritizes detection and response.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

Fidelis

Securing the Mobile and API Connected Work Space: Evernote Case Study
sponsored by Data Theorem
VIDEO: Evernote is a global software provider of mobile applications for individuals and teams. In this video, learn how Data Theorem helped Evernote identify and close 105 security issues and remove 17 harmful third-party libraries, all before releasing them to the public app stores.
Posted: 18 Sep 2019 | Premiered: 18 Sep 2019

Data Theorem

Is a Browser Isolation Solution the New "Sandbox" for Security?
sponsored by Menlo Security
VIDEO: Protecting organizations from web threats has typically been done with a proxy or DNS solution but a new approach has emerged. In this webcast, learn more why remote browser isolation technology adoption is on the rise, 3 critical requirements when selecting a practical isolation solution, and more.
Posted: 07 Jun 2019 | Premiered: 07 Jun 2019

Menlo Security

NIST Cybersecurity Framework Explained
sponsored by RSA Conference
WEBCAST: Since its release by the NIST in 2014, the Cybersecurity Framework has been the topic of conversation across industry sectors. These comments prompted Framework enhancement and clarification, forging the update v1.1 release in 2018. This webcast focuses on the information presented in the update. Watch now to learn more.
Posted: 30 Jul 2019 | Premiered: Jul 30, 2019

RSA Conference

Increasing Speed and Risk: How to Secure Third-Party Software Code
sponsored by WhiteHat Security
WEBCAST: When DevOps came to the IT scene, organizations rushed toward adoption. Now, we’re realizing that in that rush, IT overlooked some crucial security measures. In this webinar, Forrester and WhiteHat experts explore how to hit the brakes and assess your DevOps security strategy. Watch the webinar here.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security
WhiteHat Security

How to Deal with Fraudulent Counterfeit Apps
sponsored by Data Theorem
WEBCAST: A counterfeit app is an unauthorized app that exploits the reach and user of a brand or mobile app for financial gain. In this webinar, learn about the different types of counterfeit apps and how to spot them.
Posted: 24 Jun 2019 | Premiered: Jun 24, 2019

Data Theorem

Discover the Benefits of Database as a Service
sponsored by Oracle Corporation UK Ltd
VIDEO: Watch this video to learn about a Oracle's Exadata and SuperCluster Engineered Systems that deliver extreme database performance—while reducing costs and complexity.
Posted: 02 Feb 2015 | Premiered: 18 Jul 2014

Oracle Corporation UK Ltd

Moving from Simple Authentication to Identity Assurance
sponsored by RSA Conference
VIDEO: Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.
Posted: 30 Jan 2017 | Premiered: 27 Jan 2017

RSA Conference
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info