IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

IHU Threats

RSS Feed   
IHU Threats Multimedia (View All Report Types)
2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

IBM Application Security Solutions Demo
sponsored by IBM
SOFTWARE DEMO: IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008


Correlating SIM Information to Detect Insider Threats
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.
Posted: 13 Jul 2007 | Premiered: Jun 18, 2007, 13:00 EDT (17:00 GMT)

Hexis Cyber Solutions Inc

Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

Debunking the Top 5 Misconceptions about Data Protection
sponsored by Lumension
PODCAST: Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Posted: 28 Apr 2008 | Premiered: Apr 28, 2008


Cross-Site Scripting Attacks: Identify and Defend against Malicious Code
sponsored by WhiteHat Security
VIDEO: Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster.
Posted: 22 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

Real- World Examples: ROI- Results
sponsored by HealthEdge
VIDEO: Hear real-world examples of how health insurance companies reduced call center representative training, increased auto-adjudication rates and more.
Posted: 09 Nov 2017 | Premiered: 02 Nov 2017


Delivering Smart Service Management in a Digital World
sponsored by MicroFocus
WEBCAST: Tune into this video to examine an analytics-driven service management automation suite that takes advantage of machine learning to deliver a responsive and engaging experience. Its search-driven interface can accelerate agent productivity, reduce ticket volumes, and more.
Posted: 02 Mar 2018 | Premiered: Dec 4, 2017


Avoid the Legacy SIEM Death Trap and Keep Your Organization Alive
sponsored by Splunk
VIDEO: This webcast outlines steps to take when embarking on a new SIEM journey. Then hear from 3 companies who successfully migrated to a new SIEM and reaped the rewards.
Posted: 15 Feb 2018 | Premiered: 05 Dec 2017


Reducing IT Complexity and Cost for SMBs with Hyper-converged Infrastructure
sponsored by Dell EMC, Intel and Nutanix
PODCAST: Tune into this podcast as Cale Hilts, Product Marketing Manager at Dell EMC, and Mark Lavi, DevOps Solutions Architect at Nutanix, discuss the impact that deploying a hyper-converged solution could have in your SMB. You'll learn how to use HCI for virtualized apps such as Microsoft SQL Server, Exchange, and SharePoint, and more.
Posted: 15 Nov 2017 | Premiered: Nov 7, 2017

Dell EMC, Intel and Nutanix

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement