IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Multimedia (View All Report Types)
1 - 25 of 145 Matches Previous Page  |  Next Page
Carbon Black WM
sponsored by VMware International Unlimited Company
VIDEO: Research suggests that the 2020 pandemic has been the catalyst for some of cyberattacks on organizations in recent memory. In this video, join Bryan Glick (Computer Weekly) and Greg Foss (VMware Carbon Black) as they discuss the evolving challenges of cybersecurity, why they’re happing and what your organization should be doing about it.
Posted: 28 Oct 2020 | Premiered: 28 Oct 2020

VMware International Unlimited Company

A Transformative Approach to Addressing Today’s Cybersecurity Threat Landscape
sponsored by Lumen
VIDEO: Given the severity of today’s cyberthreats and the penalties for regulatory noncompliance, business outcomes are heavily influenced (if not fully dictated) by an organization’s cybersecurity well-being. Watch this webinar to learn how to align cybersecurity with business objectives and address today’s threats.
Posted: 27 Oct 2020 | Premiered: 27 Oct 2020


Leverage the SOC Visibility Triad to Automate Attacker Detection & Response
sponsored by Vectra AI
VIDEO: In order to help organizations coordinate security efforts and improve threat response, Gartner came up with the SOC Visibility Triad model, which consists of 3 key capabilities – NDR, EDR & SIEM/UEBA. The following webinar discusses how to best leverage the SOC Visibility Triad to improve security performance – watch now.
Posted: 26 Oct 2020 | Premiered: 26 Oct 2020

Vectra AI

On-Demand Webinar: The Importance of Cloud Governance
sponsored by Concourse Labs
WEBCAST: Automated cloud governance is emerging as one of the most effective ways organizations can ensure security and compliance at scale as they migrate towards cloud environments. Watch this webinar to learn more about the importance of cloud governance, its role in digital transformation, and more.
Posted: 21 Oct 2020 | Premiered: Oct 21, 2020

Concourse Labs

Virtual Fireside Chat: Current Work from Home Paradigm
sponsored by McAfee
VIDEO: The security needs of the modern remote workforce require specific protection and access needs that differ from the pre-pandemic workforce that largely worked in offices. Watch this Virtual Fireside Chat to learn more about how security should shift its focus to account for these changing needs.
Posted: 20 Oct 2020 | Premiered: 20 Oct 2020

McAfee

Empower Your Security Analysts
sponsored by McAfee
WEBCAST: Are you looking to drive SOC efficiency? Are you seeking greater automation, threat hunting and endpoint visibility and control than your current solution delivers? Watch this webcast to go in-depth on security operations with a focus on alert quality, SOC efficiency and securing endpoints at scale.
Posted: 19 Oct 2020 | Premiered: Oct 19, 2020

McAfee

See and Defend Cloud Workloads with CrowdStrike and AWS
sponsored by AWS & CrowdStrike
VIDEO: Cloud security is growing more difficult as it becomes more popular, and security teams face the growing risk of addressing these challenges alongside compliance requirements. Watch this webinar to learn how CrowdStrike and AWS are helping to provide complete security for the cloud.
Posted: 14 Oct 2020 | Premiered: 14 Oct 2020

AWS & CrowdStrike

Multicloud Security Services
sponsored by Rackspace
VIDEO: As cloud migration continues to grow in popularity, organizations are beginning to realize that traditional cybersecurity approaches are ill-fitted to address the security needs of cloud environments. Watch this webinar to discover how Rackspace and Google Cloud are working together to address these threats.
Posted: 12 Oct 2020 | Premiered: 12 Oct 2020

Rackspace

What is Okta Access Gateway
sponsored by Okta
VIDEO: Securely connecting users to applications isn’t a new problem. Historically, organizations opted for on-premise single sign-on (SSO) tools to address this. However, SSO tools are unable to meet the security and scalability needs of today’s hybrid IT environments. Watch this video to see how Okta addresses this need.
Posted: 09 Oct 2020 | Premiered: 09 Oct 2020

Okta

Technical Overview: Reducing Risk with a Remote Workforce
sponsored by SolarWinds, Inc.
WEBCAST: Working from home has drastically changed the IT security paradigm. This webinar provides an overview of those changes, highlights the current challenges and opportunities, and offers best practices for reducing risk for your remote workforce.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

SolarWinds, Inc.

How Fortinet Secures AWS Migrations
sponsored by Rackspace
VIDEO: In order to make the most of your organization’s AWS migration, it’s critical to make deliberate considerations when it comes to establishing security measures and assigning security responsibility. Watch this webinar to more and discover how Fortinet can help secure AWS migrations and integrations.
Posted: 09 Oct 2020 | Premiered: 09 Oct 2020

Rackspace

Preventing Phishing Attacks in the Digital Workforce
sponsored by Menlo Security
WEBCAST: Poor cybersecurity habits and simple employee mistakes place organizations at greater risk of credential theft and infiltration. Despite advancements in cybersecurity, phishing continues to be the number one source of breaches. Watch this webcast to learn current phishing trends of 2020 and how to prevent phishing in the digital workforce.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

Menlo Security

How to Successfully Secure Ecommerce
sponsored by Rackspace
WEBCAST: With more and more business transacted online, and with cyberthreats growing more and more complex, businesses need to find ways to optimize the performance of their websites without compromising security or falling short of compliance. Watch this webinar presented by Rackspace and Akamai for a guide through this challenge.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

Rackspace

The Future of Work Wellcome Trust HotTopics Interview
sponsored by Okta
VIDEO: In this webinar, join Eileen Jennings-Brown, Head of Technology at Wellcome Trust, and Peter Stojanovic, editor at HotTopics, as they discuss the challenges and silver linings related to the new normal and the future of work.
Posted: 08 Oct 2020 | Premiered: 08 Oct 2020

Okta

The Future of Work the Hut Group HotTopics Interview
sponsored by Okta
VIDEO: For organizations and their employees, adjusting to remote work and digital interactions has been as challenging as it is necessary. In this webinar, join Joanna Drake, CIO of The Hut Group, and Peter Stojanovic, editor at HotTopics.HT as they discuss the new normal and the future of work.
Posted: 08 Oct 2020 | Premiered: 08 Oct 2020

Okta

Securing Your Remote Workforce from Cyberattacks
sponsored by Cox Communications, Inc.
VIDEO: Now more than ever, remote workforces need to be protected in order to ensure organizations stay productive. But as cybercriminals increase the tempo and severity of their attacks, what can organizations do to better protect themselves? Watch this webinar for exclusive insight into protecting remote workers.
Posted: 08 Oct 2020 | Premiered: 08 Oct 2020

Cox Communications, Inc.

How Visibility Unlocks Zero-Disruption Microsegmentation
sponsored by ColorTokens
WEBCAST: Microsegmentation is gaining popularity amongst security architects for its ability to enhance agility, incident response, compliance readiness and more. Watch this webinar to learn more about the benefits and possibilities of microsegmentation from 2 distinguished experts.
Posted: 08 Oct 2020 | Premiered: Jul 29, 2020

ColorTokens

Path to PCI-DSS 4.0: Simplifying Compliance and Securing Cardholder Data
sponsored by ColorTokens
VIDEO: PCI-DSS v4.0 is expected to arrive in late 2020/early 2021 – and organizations are beginning to prepare. This webinar provides an overview of PCI-DSS 4.0, including the expected changes, what will (likely) remain unchanged, how zero-trust fits in, and more – watch now to get started.
Posted: 07 Oct 2020 | Premiered: 12 Jun 2020

ColorTokens

Preparing to Implement and Maintain a Zero Trust Security Strategy - Webcast and Demonstration
sponsored by Ionic Security
WEBCAST: The implementation and maintenance of a Zero Trust strategy requires meticulous preparation in order to ensure that users, devices, applications and networks are all protected. Watch this webinar and demo, which follows the story of an organization who sought to focus their Zero Trust efforts on protecting employee PII.
Posted: 07 Oct 2020 | Premiered: Oct 7, 2020

Ionic Security

Cox Communications: The Anatomy of an Email Hack
sponsored by Cox Communications, Inc.
WEBCAST: Email security has never been under greater threat. The boom in remote employees accessing private networks has demanded more of firewalls than ever before, and as such, there are bound to be some attacks that will work their way through. Watch this webcast to understand the anatomy of a live email hack.
Posted: 06 Oct 2020 | Premiered: Oct 6, 2020

Cox Communications, Inc.

Transformative Risk Management
sponsored by LogicGate
PODCAST: Like social distancing to “flatten the curve”, effective risk management starts with focusing on the self and a small inner circle. In this podcast, join 3 distinguished GRC experts and risk leaders as they discuss the new era of risk management. Listen in to hear what they have to say.
Posted: 05 Oct 2020 | Premiered: Oct 5, 2020

LogicGate

GRC & Me: A Conversation on Risk Language
sponsored by LogicGate
PODCAST: Communication is one of the foundational elements of an organization’s ability to ensure productive relationships both within and between companies. In this podcast, join Melissa Ryan, co-founder of Asureti, as she discusses how her risk language and threat rating tools facilitate communication within and between organizations.
Posted: 05 Oct 2020 | Premiered: Oct 5, 2020

LogicGate

Watch: Calculating and Using RoSI
sponsored by CyberSaint
VIDEO: The ability to calculate and demonstrate return on security investments (RoSI) plays a major role in ensuring buy-in from the CEO and board as well as securing more budget. Watch this video to learn how to calculate and use RoSI for future cybersecurity initiatives.
Posted: 05 Oct 2020 | Premiered: 05 Oct 2020

CyberSaint

Leverage the power of Rapid7 and AWS integrated threat protection and response solution
sponsored by AWS Rapid7
VIDEO: Cloud environments are growing at such a rapid pace that traditional SIEM tools often lack the visibility to identify and mitigate threats – leading to an overworked security staff. This webinar discusses how the integration of Rapid7 InsightIDR and Amazon GuardDuty can improve visibility (and morale) for organizations with AWS environments.
Posted: 01 Oct 2020 | Premiered: 01 Oct 2020

AWS Rapid7

Changing the Rules of Ransomware
sponsored by Dell SecureWorks
VIDEO: Ransomware has become a series threat to an organization’s data – and there is conflicting advice on whether an organization should pay the ransom or not. This webinar provides a closer look at the evolution of ransomware attacks, which regions and industries are most affected, why an organization should or shouldn’t pay, and more.
Posted: 01 Oct 2020 | Premiered: 01 Oct 2020

Dell SecureWorks
1 - 25 of 145 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info