Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Espionage

RSS Feed   
Espionage Multimedia (View All Report Types)
 
Billion Dollar Blindness
sponsored by TechTarget
WEBCAST: Access this webcast to learn how using the latest intent data and AI-driven technologies can transform their productivity and yields from a market, an ICP, or a set of named ABM accounts.
Posted: 26 Feb 2020 | Premiered: Feb 19, 2020

TechTarget

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

New Reality of Stealth Crimeware Video
sponsored by Intel
WEBCAST: An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012

Intel

Serena Service Management: Free Trial
sponsored by SERENA Software, Inc.
TRIAL SOFTWARE: Serena Service Manager is an processed-based ITSM solution that keeps people and processes perfectly in sync. View now to try Pink Elephant's ITIL innovation of the year.
Posted: 05 Apr 2012 | Premiered: 05 Apr 2012

SERENA Software, Inc.

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

Beta Systems IAM: Protection From The Inside Perpetrator
sponsored by Beta Systems
VIDEO: It’s a common misconception that cyberattacks originate from external hackers. However, it’s been found that inside perpetrators – usually current or former employees – present a serious risk. Watch this video to learn more about Beta Systems IAM and how it’s enabling organizations to protect sensitive data and prevent internal threats.
Posted: 04 Nov 2020 | Premiered: 01 Oct 2020

Beta Systems

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

How to Protect Your Organization with Managed Threat Detection and Response
sponsored by AT&T Cybersecurity
WEBCAST: Security is spreading its wings. SD-WAN and cloud-based security are both being adopted at a high rate, and this adoption begins with conversations about cyber risk. Because security talent is in short supply, professionals need to find ways to fend off threats. Watch this webcast for a live demo of AT&T’s Managed Threat Detection and Response.
Posted: 19 Jan 2021 | Premiered: Jan 19, 2021

AT&T Cybersecurity

How Humans and AI Can Work Together
sponsored by Enate UK
VIDEO: In this quick video, learn how humans and AI can work together with SaaS-based technology platforms that facilitates the delivery and management of services across both the digital and human workforce. Watch the video here.
Posted: 20 Jan 2021 | Premiered: 24 Sep 2020

Enate UK

Just an Air Filter: Intro to The Iotics Platform
sponsored by Iotics
VIDEO: Iotics is a platform that surfaces critical events across your business and supply chain in real time. Check out this video to see the impact Iotics can have on your organization, including how it can optimize operations, help you develop new service revenues, and maximize value.
Posted: 30 Dec 2020 | Premiered: 30 Dec 2020

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info