IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Internal Nonhostile Unstructured Threats

RSS Feed   
Internal Nonhostile Unstructured Threats Multimedia (View All Report Types)
Correlating SIM Information to Detect Insider Threats
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.
Posted: 13 Jul 2007 | Premiered: Jun 18, 2007, 13:00 EDT (17:00 GMT)

Hexis Cyber Solutions Inc

Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

IBM Application Security Solutions Demo
sponsored by IBM
SOFTWARE DEMO: IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008


Debunking the Top 5 Misconceptions about Data Protection
sponsored by Lumension
PODCAST: Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Posted: 28 Apr 2008 | Premiered: Apr 28, 2008


2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

Payer's Place in the Healthcare Ecosystem Keys to Success
sponsored by HealthEdge
VIDEO: Learn how payers, providers and consumers can collaborate effectively, and about the transformation from fee for service to paying for value.
Posted: 10 Nov 2017 | Premiered: 02 Nov 2017


3 Life Hacks for Rationalizing your Application & Technology Portfolios
sponsored by Mega International
VIDEO: When streamlining your IT portfolio your goal is to free up budget for new initiatives, and you need an efficient method of doing so. This webcast covers three life hacks to help you work smarter, not harder, when engaging in an IT portfolio rationalization project.
Posted: 10 Jan 2018 | Premiered: 10 Jan 2018

Mega International

The General Data Protection Regulation (GDPR) is Here
sponsored by BackOffice Associates
WEBCAST: In this webcast, Enza Iannopollo, security & risk analyst at Forrester Research, demonstrates how to get started on building a risk management policy that will best suit the needs of your company.
Posted: 16 Mar 2018 | Premiered: Mar 16, 2018

BackOffice Associates

ChatOps Smart Communications at University of Pretoria
sponsored by MicroFocus
WEBCAST: Using Micro Focus Service Manager ChatOps, the University of Pretoria was able to optimize its IT service management with a tool that allows IT staff to communicate anywhere and respond instantly. Tune into this video to learn more about this automated ITSM platform.
Posted: 05 Mar 2018 | Premiered: Jan 2, 2018


Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
WEBCAST: According to a Ponemon Institute study, 59% of respondents believe cyber automation will reduce operating costs and 55% believe it will reduce personnel cost. This webcast offers insight into reducing cybersecurity costs through automation technologies.
Posted: 16 Feb 2018 | Premiered: Feb 16, 2018

Juniper Networks

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement