IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Consumer Privacy

RSS Feed   
DEFINITION: EU Data Protection Directive (also known as Directive 95/46/EC) is a directive adopted by the European Union designed to protect the privacy and protection of all personal data collected for or about citizens of the EU, especially as it relates to processing, using, or exchanging such data. Directive 95/46/EC encompasses all key elements from article 8 of the European Convention on Human Rights, which  … 

Consumer Privacy definition sponsored by SearchSecurityUK.com, powered by WhatIs.com an online computer dictionary
Consumer Privacy Multimedia (View All Report Types)
 
Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

Solving the Financial Services Security Talent Shortage with Managed Detection
sponsored by Arctic Wolf
WEBCAST: This webcast explores how banks and other financial institutions can protect their critical assets with managed detection and response. Find out how you can overcome the security skills shortage with threat detection services.
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

Arctic Wolf

SANS Fingerprinting Threat Actors with Web Assets
sponsored by DomainTools
WEBCAST: Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.
Posted: 11 Jan 2019 | Premiered: May 31, 2018

DomainTools

Run Applications Anywhere
sponsored by Trend Micro, Inc.
WEBCAST: In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses how you can implement a simpler strategy for maintaining security while running your applications in any environment.
Posted: 04 Apr 2019 | Premiered: Apr 4, 2019

Trend Micro, Inc.

Building Secure Software
sponsored by Trend Micro, Inc.
WEBCAST: Building securely doesn't just mean the code you are creating is high quality and doesn't have any obvious security vulnerabilities; it's more complicated than that. You have to account for that complexity when checking for vulnerabilities. In this webcast, listen as Mark Nunnikhoven of Trend Micro discusses how to build securely.
Posted: 03 Apr 2019 | Premiered: Apr 3, 2019

Trend Micro, Inc.

Fidelis Deception Demo - Product Overview
sponsored by Fidelis
VIDEO: Tune into this webinar to learn how your organization can use modern deception defenses to ensure an efficient and strong post-breach defense.
Posted: 14 Aug 2018 | Premiered: 14 Aug 2018

Fidelis

Propel PLM: Cloud Security in 5 Minutes
sponsored by PropelPLM
VIDEO: Is my data safe in the cloud? For those considering cloud-based PLM, questions of security always come to mind. In this 5-minute video, Propel Marketing VP addresses common cloud myths, and answers common cloud security questions. Download now to access the full video, and put your mind at ease.
Posted: 15 Feb 2019 | Premiered: 12 Jun 2018

PropelPLM

How To Analyze and Investigate Malicious Javascript Attacks
sponsored by DomainTools
WEBCAST: The increased frequency of JavaScript attacks creates big problems when trying to protect your users. JavaScript is the top language running on the web with 80% of the top 1 million sites using it in some capacity. In this webcast, Tarik Saleh, Keith Hoodlet and Paul Asadoorian will show you several different forms of malicious JavaScript.
Posted: 10 Jan 2019 | Premiered: Jan 10, 2019

DomainTools

The Beginner's Guide to Mitigating Phishing Attacks
sponsored by DomainTools
WEBCAST: Phishings attacks are a common form of fraud that is most commonly done by disguising malicious links to distribute malware. In this webcast, Corin Imani, Senior Security Advisor at DomianTools discusses real world examples, the steps to executing a phishing attack and ways to remediate a phishing attack.
Posted: 10 Jan 2019 | Premiered: Jan 10, 2019

DomainTools

Automating Software Security Checks for Open Source Software and SDKs
sponsored by Data Theorem
WEBCAST: The growth of open source software (OSS) and 3rd-party software development kits (SDKs) have been on the rise over the last 5 years, and for good reason. But there are downsides. Learn about them in this webinar, which covers: Risks of using OSS and SDKs for apps, challenges of staying ahead of vulnerability issues in 3rd-party software, and more.
Posted: 11 Apr 2019 | Premiered: Apr 11, 2019

Data Theorem
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement