IT Management  >   Systems Operations  >   Security  >  

Internet Applications Security

RSS Feed   
Internet Applications Security Multimedia (View All Report Types)
 
A Deeper Look Into the Threat of Botnets
sponsored by Cisco Umbrella
VIDEO: Tune into this Cisco Umbrella webinar to learn about how recent botnets infect, proliferate and distribute malware, and how you can keep your users safe from malware distributed by botnets.
Posted: 29 Jun 2020 | Premiered: 29 Jun 2020

Cisco Umbrella

Industry and Financial Regulations: The Implications for Application Security
sponsored by Veracode, Inc.
WEBCAST: Today’s financial institutions face stringent regulations to ensure the responsible management and protection of sensitive user data. In this webinar, join Chris Wysopal, CTO and co-founder of Veracode, as they navigate the security and compliance implications of building and maintaining a mobile financial application.
Posted: 05 May 2020 | Premiered: May 5, 2020

Veracode, Inc.

Taking A “Prevent and Protect” Approach to Insider Data Breaches
sponsored by Egress Software Technologies Inc
VIDEO: As cyberattacks become occur more frequently than ever, organizations need to ensure their security efforts are focused on protecting from both external & internal threats. In this video, join the CPO of Egress in an overview of how an email security strategy can enhance regulatory compliance, reduce costs & increase profitability.
Posted: 03 Feb 2020 | Premiered: 23 Oct 2019

Egress Software Technologies Inc

The Beginner's Guide to Threat Hunting
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.
Posted: 11 Jan 2019 | Premiered: Dec 31, 2018

DomainTools

Avoiding Top 3 Security Challenges of Digital Transformation
sponsored by Menlo Security
WEBCAST: In the current business landscape, there’s no doubt that the web is now the most important business tool. Critical systems that were once on-prem are moving to the cloud as a widely trusted alternative. In this webcast, learn about the top 3 security challenges of digital transformation.
Posted: 20 Mar 2020 | Premiered: Mar 20, 2020

Menlo Security

Mimecast Cyber Resilience For Email
sponsored by Mimecast
WEBCAST: Listen as Joel Bedoford and Phillip Clark from Mimecast explore the current cyber resilience landscape for Australian businesses and unpack survey results from 257 IT decisions makers on the topic of Cyber Resilience for Email.
Posted: 01 Aug 2019 | Premiered: Aug 1, 2019

Mimecast

SANS Fingerprinting Threat Actors with Web Assets
sponsored by DomainTools
WEBCAST: Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.
Posted: 11 Jan 2019 | Premiered: May 31, 2018

DomainTools

Webinar - Say Goodbye to Threats, Network Complexity, and Inefficiency: New ESG Research
sponsored by Cisco Umbrella
WEBCAST: Threats, network complexity and inefficient tools all drive the need for a new approach to security. With more mobile devices and more cloud access, handling and responding quickly to threats can be hard. If you’re frustrated with endless alerts and inconsistent policy enforcement, watch this webcast to learn a more efficient way to secure users.
Posted: 31 Jul 2020 | Premiered: Jun 23, 2020

Cisco Umbrella

Web Application Authorization and Authentication Explained
sponsored by WhiteHat Security
VIDEO: According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

The Token is Dead. Long Live the Token
sponsored by SafeNet, Inc.
WEBCAST: View this webcast as speakers discuss hardware and software-based authentication, extending authentication to cloud-based applications, credentialing and managing consumer-grade mobile devices while minimizing security risks, and offer best practices for striking the balance between security, ease of use, manageability and cost
Posted: 17 Aug 2011 | Premiered: Aug 17, 2011

SafeNet, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info