IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

IHS Threats

RSS Feed   
IHS Threats Multimedia (View All Report Types)
 
2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

IBM Application Security Solutions Demo
sponsored by IBM
SOFTWARE DEMO: IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008

IBM

How to Manage Access Control with Zero Trust
sponsored by AT&T Cybersecurity
WEBCAST: Listen in on this conversation with the AT&T Chief Security Office (CSO) on their current point of view on how to manage access control using ZT principals, including best practices.
Posted: 29 Jul 2020 | Premiered: Jul 29, 2020

AT&T Cybersecurity

Guiding Your Cyber Security Team to Success How to Measure Results, Secure Budget, and Avoid Stress
sponsored by Thycotic
WEBCAST: Convincing the board of the security team's business value can often be challenging, as they're often perceived as being a maintenance role. That's why Thycotic's new webinar provides tips on how to communicate effectively to the board and help change their perceptions that restrict cybersecurity effectiveness.
Posted: 27 Jul 2020 | Premiered: Jul 30, 2020

TOPICS:  Security
Thycotic

Tata Communications’ Secure Web Gateway
sponsored by TATA Communications
VIDEO: As applications, infrastructures and data continue to move to the cloud, ensuring users have appropriate and reliable access – regardless of location – is critical. In this short video, discover how Tata Communications’ Secure Web Gateway enables users with enhanced visibility and security.
Posted: 30 Jul 2020 | Premiered: 15 Aug 2018

TATA Communications

How Threat Modeling & Attack Simulation Works
sponsored by Coalfire
WEBCAST: In this webinar, join Mike Weber, VP of Innovation at Coalfire, as he overviews how threat modeling and cyberattack simulations work within security program architectures – including how to interpret simulation data. Watch now to learn more about identifying and understanding the risks within your environment.
Posted: 06 Jul 2020 | Premiered: Jul 6, 2020

Coalfire

Summer School Gone Virtual? How to Keep Virtual Activities Safe for Students
sponsored by Cisco Umbrella
WEBCAST: Schools are under constant threat from a variety of attacks, and with students now learning from home, hackers are finding it easier to break in. Without the right network security, your school district could be at risk.Watch this informative webcast about Cisco Umbrella, cloud-delivered network security that keeps your school safe.
Posted: 01 Jul 2020 | Premiered: May 18, 2020

Cisco Umbrella

The Future of Work: Okta Podcast
sponsored by Okta
PODCAST: Listen to the first episode of The Future of Work Series, in partnership with Okta, with Guy Mason, Bourne Leisure Group’s CIO, in conversation with Editor Peter Stojanovic as they discuss how to adjust to a remote work lifestyle.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

Okta

Securing Your Data Stored in OneDrive: SailPoint Demo
sponsored by SailPoint Technologies
VIDEO: In order to responsibly migrate to the cloud, organizations need to take deliberate steps to ensure their cloud-native data is just as secure as on-premise data. Watch this short video for a brief overview of the challenges of ensuring cloud data protection and ways to overcome them.
Posted: 23 Jul 2020 | Premiered: 23 Jul 2020

SailPoint Technologies
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info