IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

INU Threats

RSS Feed   
INU Threats Multimedia (View All Report Types)
 
Debunking the Top 5 Misconceptions about Data Protection
sponsored by Lumension
PODCAST: Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Posted: 28 Apr 2008 | Premiered: Apr 28, 2008

Lumension

Correlating SIM Information to Detect Insider Threats
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.
Posted: 13 Jul 2007 | Premiered: Jun 18, 2007, 13:00 EDT (17:00 GMT)

Hexis Cyber Solutions Inc

IBM Application Security Solutions Demo
sponsored by IBM
SOFTWARE DEMO: IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008

IBM

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

You Can't Spell Enterprise Security without MFA
sponsored by Ping Identity Corporation
WEBCAST: Enterprises are under attack, and credentials are a primary target. Many leading enterprises are enhancing their security and controls with multi-factor authentication, allowing them to move away from a high-risk, password based security approach. Listen as Paul Madsen from the CTO office of Ping Identity explains the benefits of MFA.
Posted: 18 Dec 2018 | Premiered: Dec 31, 2018

Ping Identity Corporation

Meet the Experts: Open Source Security 101
sponsored by WhiteSource
WEBCAST: According to Forrester, 80% of developers used open source in their applications in the past year. When using open source, you must consider the security of the application. This webinar provides a high level overview of considerations that engineering teams and security officers should keep in mind when tackling open source security issues.
Posted: 14 Jan 2019 | Premiered: Jan 26, 2017

WhiteSource

Security at the Speed of Software Development
sponsored by WhiteSource
WEBCAST: DevSecOps is expected to grow for years to come and many companies have recognized the need to reposition to look more like DevSecOps. However, a lot of that repositioning is just marketing and there is no attempt to really make the transition. In this webcast, Larry Maccherone discusses a 3-part framework for adopting the DevSecOps culture.
Posted: 15 Jan 2019 | Premiered: May 9, 2018

WhiteSource

SANS Fingerprinting Threat Actors with Web Assets
sponsored by DomainTools
WEBCAST: Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.
Posted: 11 Jan 2019 | Premiered: May 31, 2018

DomainTools

Automating Security and Compliance for Hybrid Cloud Environments
sponsored by Red Hat
VIDEO: Why automate security and compliance? Tune into this webinar to learn about an automated approach that can help you perform audit scans on your systems, ensure governance and control, easily provide security-compliant hosts, and more.
Posted: 30 Nov 2018 | Premiered: 20 Nov 2018

Red Hat
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement