IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Disk Destruction

RSS Feed   
Disk Destruction Multimedia (View All Report Types)
 
Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


Painless DevSecOps Integration across the Value Stream
sponsored by Tasktop
WEBCAST: This webcast explores how to take a DevSecOps approach to minimizing the impact of vulnerabilities on your apps. Find out how to make developers, QAers, and security pros aware of vulnerabilities as soon as possible and discover how you can integrate tools end-to-end across the value stream.
Posted: 06 Feb 2018 | Premiered: Feb 6, 2018

Tasktop

What is GDPR? And Why Should I Care?
sponsored by Commvault
VIDEO: The General Data Protection Regulation (GDPR) will kick in May 2018, and it will have a huge impact on how you collect and manage the personal data of EU residents, even if you're not located in Europe. Get an overview of the GDPR, including who the legislation affects and the penalties for non-compliance.
Posted: 09 Aug 2017 | Premiered: 07 Jun 2017

Commvault

Your Security Sandbox Won't Catch it all: The Phishing Problem
sponsored by Proofpoint, Inc.
WEBCAST: Take a look at this webcast to uncover different types of email threats through various applications and what your organization can do to reduce your vulnerabilities against malware.
Posted: 04 Oct 2017 | Premiered: Oct 4, 2017

Proofpoint, Inc.

The Business of IT Transformation
sponsored by Rackspace
WEBCAST: Tune into this webcast to hear from the CIO and Digital CTO at Rackspace, who in detail dissect the term "digital transformation" and highlight the challenges driving businesses like yours to the cloud. They also run down an actionable cloud implementation checklist, for you to use as guidance.
Posted: 13 Oct 2017 | Premiered: Mar 29, 2017

Rackspace

How Splunk Enables Fast Data Science for Cybersecurity Operations
sponsored by Splunk
WEBCAST: Discover how to bridge the gap between data scientists and security analysts to accelerate intelligence for cybersecurity operations. Plus, find out how Splunk's machine learning-enabled analytics provides a unified system for collecting, digesting, and querying data.
Posted: 12 Oct 2017 | Premiered: Sep 30, 2017

Splunk

2018 Security Predictions for an Unpredictable World
sponsored by WhiteHat Security
VIDEO: Large scale breaches are going to continue to occur, so understanding past breaches and coming up with an attack action plan for the future is necessary. This webinar provides a cybersecurity review of 2017 and offers 2018 predictions for which to prepare.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WEBCAST: In this webcast, learn about deception technology, a cybersecurity tactic which creates an illusion of reality that the adversary cannot differentiate, ultimately protecting your network and sensitive data.
Posted: 21 Feb 2018 | Premiered: Feb 21, 2018

Illusive Networks

Getting the Most out of your AppSec Program
sponsored by WhiteHat Security
VIDEO: According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program.
Posted: 23 Jan 2018 | Premiered: 23 Jan 2018

WhiteHat Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement