IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Multimedia (View All Report Types)
1 - 25 of 71 Matches Previous Page  |  Next Page
Webinar: You Need Live Patching to Achieve SOC2 Compliance
sponsored by CloudLinux
VIDEO: In this webinar, join industry experts as they share best practices and use cases of data protection and vulnerability management for maintaining compliance in their Linux-based systems. Continue to view the webinar.
Posted: 24 Jan 2020 | Premiered: 11 Jul 2019


Spear-phishing Analysis with ThreatQ Investigations
sponsored by ThreatQuotient
WEBCAST: Spear-phishing attacks are a growing security threat to organizations and their employees. These attacks target victims from a seemingly reliable source to lure them to a malware-ridden site. This webinar provides an analysis of how to develop your spear-phishing investigation skills to spot an and attack before it becomes troublesome.
Posted: 23 Jan 2020 | Premiered: Jan 23, 2020

ThreatQuotient

Making MITRE ATT&CK Actionable
sponsored by ThreatQuotient
WEBCAST: In this webinar, join technical experts at ThreatQuotient as they outline merging MITRE ATT&CK with SIEM visibility and threat intelligence in the ThreatQ platform to unify threat detection efforts. Interested in seeing how this platform works? Watch the webinar to learn more.
Posted: 23 Jan 2020 | Premiered: Jan 23, 2020

ThreatQuotient

The 5 Most Dangerous New Attack Techniques: Are They Evolving?
sponsored by RSA Conference
WEBCAST: Each year at RSAC, SANS Institute reveals the most dangerous new attack techniques. On the list for 2019 were smartphone attacks, DNS manipulation, domain fronting, cloud-on-cloud attacks, CPU flaws and more. Watch this RSAC webcast to see the full—and accurate—list, plus the best methods to defeat these attacks.
Posted: 22 Jan 2020 | Premiered: Nov 19, 2019

RSA Conference

Threats of Surveillance Tools: Spyware and Stalkerware
sponsored by RSA Conference
PODCAST: Digital monitoring of workers, children and spouses is more commonplace than ever. But what happens when the line between monitoring and spying becomes blurred? Tune in to this RSAC podcast as two security experts share the work they’ve been doing to help protect victims and their personal data from unwanted surveillance.
Posted: 21 Jan 2020 | Premiered: Dec 16, 2019

RSA Conference

What is Tehama?
sponsored by Tehama
VIDEO: Today’s organizations need speed, security and access in order to stay competitive. In one SaaS platform, Tehama consolidates all capabilities and tools necessary to ensure secure access, continuous auditing and compliance enforcement. Continue to learn more about Tehama.
Posted: 20 Jan 2020 | Premiered: 20 Jan 2020

Tehama

QualiFYI
sponsored by QualiSystems
VIDEO: There’s a massive demand for cyber experts to secure networks with efficiency and confidence. With cyber ranges, testing the defenses is easier and more trustworthy. In this brief interview, Quali discusses how cyber range training is a crucial endeavor that organizations must take on. Click inside the hear why.
Posted: 17 Jan 2020 | Premiered: 17 Jan 2020

QualiSystems

Travelex, UK retail in 2019, and royal departures
sponsored by ComputerWeekly.com
PODCAST: In this week's episode of the Computer Weekly Downtime Upload podcast, Caroline Donnelly, Clare McDonald and Brian McKenna talk about the Travelex ransomware attack, the retail sector's poor performance in 2019, and Harry and Meghan's Instagram-powered separation from the Windsors.
Posted: 17 Jan 2020 | Premiered: Jan 14, 2020

TOPICS:  Cybersecurity
ComputerWeekly.com

Secure Coding Practices: Avoid Cross-Site Scripting Attacks
sponsored by WhiteHat Security
WEBCAST: Application architectures have changed. Have cyberattacks changed with them? In this webinar, WhiteHat examines the past, present, and future state of cross-site scripting (XSS) attacks, including: the new XSS matrix, the barriers to implementation, how templating engines can help, and how to address XSS threats. Watch the webinar now.
Posted: 14 Jan 2020 | Premiered: Jan 14, 2020

TOPICS:  Cybersecurity
WhiteHat Security

Zero Trust Access
sponsored by PortSys
WEBCAST: Cyberattacks are becoming increasingly damaging, and the strategies in place are ineffective at mitigating these breaches. Join the CEO of PortSys in this webinar as he discusses why today’s security tactics fall short and how the zero-trust approach can help to better defend data.
Posted: 03 Jan 2020 | Premiered: Jan 3, 2020

PortSys

Application Shielding First Line of Defense for Financial Apps
sponsored by Intertrust
WEBCAST: In this webinar, join Paul Butterworth, the Director of Product Marketing at Intertrust, as he discusses the risks your financial applications face, best practices for protecting applications, IP and keys and explore some real-world examples from financial services.
Posted: 18 Dec 2019 | Premiered: Oct 29, 2019

Intertrust

Account Takeover Attacks Are On The Rise
sponsored by PerimeterX
WEBCAST: This video describes everything you need to know about account takeovers and what you can do to prevent them at your organization. It also details recent breach examples from companies like FitBit, Marriott Hotels, Twitter, and more. Tune in to learn more about account takeover attacks.
Posted: 12 Dec 2019 | Premiered: Dec 12, 2019

PerimeterX

Reverse Engineering Still a Serious Problem in 2019
sponsored by Intertrust
WEBCAST: While mobile applications and interconnected devices offer unmatched convenience, they also expose organizations and consumers to cybersecurity risks. This webinar breaks down common mobile application security threats and highlights real-life reverse engineering examples.
Posted: 12 Dec 2019 | Premiered: Nov 8, 2019

Intertrust

Top 5 Threats to E-commerce Businesses
sponsored by PerimeterX
WEBCAST: This video highlights the top 5 threats to e-commerce businesses companies need to be vigilant before this, and any, holiday season. Tune in to learn about these 5 attack trends.
Posted: 12 Dec 2019 | Premiered: Dec 12, 2019

PerimeterX

Protecting from Bot Attacks with PerimeterX
sponsored by PerimeterX
VIDEO: In this customer success story, Build.com shares how PerimeterX Bot Defender protects their online storefront from advanced bot attacks in the wake of a series of cyberattacks. Watch the video to learn more.
Posted: 10 Dec 2019 | Premiered: 03 Jan 2020

PerimeterX

Evolve your Security Operations Center
sponsored by Optiv
WEBCAST: Digital transformation has revolutionized the way business is conducted. However, cybersecurity hasn’t kept pace with technology changes and trends. Evolving your SOC will help your organization better analyze, plan, build, run and measure. Continue to this video to get started.
Posted: 04 Dec 2019 | Premiered: Sep 23, 2019

Optiv

Is the Cloud Transforming Security?
sponsored by Menlo Security
WEBCAST: As IT teams continue to prioritize cloud transformation, it’s imperative to also reconsider security tactics in order to realize the full benefits of cloud services.In this webinar, leverage industry expertise around cloud transformation, security implications, and explore the benefits of isolation tactics.
Posted: 27 Nov 2019 | Premiered: Nov 27, 2019

Menlo Security

Guide to Eliminating the Top 3 Security Pain Points
sponsored by Menlo Security
WEBCAST: In this webinar, leverage the knowledge of industry experts at 451 research and Menlo Security to uncover the most significant information security pain points and strategic recommendations for eliminating them.
Posted: 26 Nov 2019 | Premiered: Sep 26, 2019

Menlo Security

Claroty Continuous Threat Detection Demo
sponsored by Claroty
WEBCAST: Continuous threat detection (CTD) allows for efficient security with minimal complexity compared to traditional threat detection tools. In this webinar, IT leaders at Claroty discuss the importance of total visibility for data acquisition and provide an in-depth demo of their new dashboard. Continue to watch the demo.
Posted: 18 Nov 2019 | Premiered: Nov 18, 2019

Claroty

Automating Identity & Access Management
sponsored by Hitachi ID
WEBCAST: Identity and access management (IAM) is the process of creating new and modifying existing identities as well as managing the security entitlements associated with those identities. In this webcast, discover an overview of introducing automation to your IAM. Watch now to learn more.
Posted: 14 Nov 2019 | Premiered: Feb 28, 2019

Hitachi ID

Structuring an IAM program
sponsored by Hitachi ID
WEBCAST: With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.
Posted: 13 Nov 2019 | Premiered: Oct 17, 2019

Hitachi ID

Cyber Hygiene: Doing the Basics with Microsoft
sponsored by Snow Software
WEBCAST: Cybersecurity is an easily defined term but achieving a secure environment & security protocol takes diligent planning. So, what are the basics of cyber hygiene & what steps must my organization take towards cybersecurity?In this webinar, leverage industry expertise to uncover some of the fundamentals of cyber hygiene.
Posted: 07 Nov 2019 | Premiered: Nov 7, 2019

Snow Software

Improving Cybersecurity with ITAM: An Equifax Case Study
sponsored by Snow Software
WEBCAST: Leveraging IT Asset Management (ITAM) can help protect your organization from the repercussions of data breaches. And with data breaches becoming an increasing occurrence, organizations must re-evaluate their current security environment. In this webinar, learn how ITAM can augment your cybersecurity strategy today.
Posted: 31 Oct 2019 | Premiered: Oct 31, 2019

Snow Software

Introduction to Claroty
sponsored by Claroty
WEBCAST: In this webcast, Claroty's Dave Weinstein discusses how Claroty's solution helps IoT-OT security and operations teams discover IoT-OT assets on the network and identify vulnerabilities, continuously monitor networks and detect malicious activity and more.
Posted: 27 Sep 2019 | Premiered: Sep 27, 2019

Claroty

Automated Threat Detection, Threat Hunting, and Response Platform
sponsored by Fidelis
WEBCAST: In this on-demand demo, see how Fidelis Elevate can help your organization shift from a prevention-focused approach to one that prioritizes detection and response.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

Fidelis
1 - 25 of 71 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info