IT Management  >   Systems Operations  >   Security  >  

Public Safety

RSS Feed   
Public Safety Multimedia (View All Report Types)
 
Top 10 Application Security Vulnerabilities for Developers
sponsored by WhiteHat Security
VIDEO: Join Mark Rogan, DAST Manager from the WhiteHat Security Threat Research Center, as he discusses the top vulnerabilities and gives valuable prevention tips for enterprises to implement.
Posted: 13 May 2019 | Premiered: 13 May 2019

WhiteHat Security

The Top Industries at Risk for Cyber Attacks
sponsored by Barracuda
VIDEO: This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.
Posted: 29 May 2019 | Premiered: 31 Dec 2018

Barracuda

Cloud Security Guardian integration with Microsoft Azure 2019
sponsored by Barracuda
VIDEO: In this video, learn about Barracuda Cloud Security Guardian and how it orchestrates, automates, and simplifies configuration and management across all of your Azure firewalls.
Posted: 27 Sep 2019 | Premiered: 10 Jul 2019

Barracuda

Cryptojacking, The Sequel: Life After Coinhive
sponsored by Webroot
PODCAST: The popular cryptomining tool Coinhive has closed its doors. So the cryptojacking threat should decline, right? 'Not so fast' Webroot threat analysts Tyler Moffitt tells host Joe Panettieri. Tune into this podcast to find out who's filling in where Coinhive left off.
Posted: 05 Aug 2019 | Premiered: Aug 5, 2019

Webroot

Fidelis Deception Demo
sponsored by Fidelis
WEBCAST: Download this video for an overview of Fidelis Deception. In the video, you'll learn how to use Fidelis to map your network and understand your terrain, how to deploy deception and more.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

Fidelis

Modernizing Data Protection
sponsored by Forcepoint
WEBCAST: Navigating your data protection journey can be complex. It requires you to keep up with the latest regulations and protect intellectual property – all while adapting to evolving IT environments. In this webcast, Angelica Torres-Corral discusses how to gain visibility and control of your data, optimize a DLP solution, and more.
Posted: 10 Oct 2019 | Premiered: Oct 10, 2019

Forcepoint

Is Fax the Achilles Heel of Your Compliance and Cybersecurity Plan
sponsored by J2 Cloud Services
WEBCAST: Today, many organizations have little to no security and compliance strategies for fax machines, printers or services. This represents a very real vulnerability. In this webcast, Aaron Goldberg, CEO of Content 4 IT and Brad Spannbauer, Senior Director of Product Management at J2 Cloud Services, discuss 5 fax security disasters in the making.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

J2 Cloud Services

Automating Software Security Checks for Open Source Software and SDKs
sponsored by Data Theorem
WEBCAST: The growth of open source software (OSS) and 3rd-party software development kits (SDKs) have been on the rise over the last 5 years, and for good reason. But there are downsides. Learn about them in this webinar, which covers: Risks of using OSS and SDKs for apps, challenges of staying ahead of vulnerability issues in 3rd-party software, and more.
Posted: 11 Apr 2019 | Premiered: Apr 11, 2019

Data Theorem

Unified Threat Management: Locking Your Network Down
sponsored by Comcast Business
WEBCAST: While there is no end-to-end "silver bullet" in terms of security solutions, Unified Threat Management (UTM) offers a suite of technologies that can make it a foundational part your network security. In this webinar from Comcast Business, discover UTM capabilities, functions, and benefits.
Posted: 30 Sep 2019 | Premiered: Sep 30, 2019

Comcast Business

ML-Driven Security Analytics and Automated Threat Response for IoT Part 1
sponsored by Extreme Networks
WEBCAST: Adopting specific machine learning capabilities can help you identify & respond to threats inside your network before it’s too late. That’s where machine learning & AI can assist you with automated anomaly & threat detection analytics. Learn how this industry-unique approach can help protect your network today.
Posted: 31 Oct 2019 | Premiered: Feb 19, 2019

Extreme Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement