IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Push Messaging

RSS Feed   
Push Messaging Multimedia (View All Report Types)
 
Distributed Denial Of Service
sponsored by Neustar
VIDEO: How can you avoid outages from DDoS attacks? In this short video, learn about SiteProtect NG that offers, quick detection and alerting, integrated intelligence, PCI DSS compliance, and much more.
Posted: 04 Mar 2019 | Premiered: 04 Mar 2019

Neustar

HOL: Container Native Application Development
sponsored by Oracle Corporation
WEBCAST: Between enhancement requests, bug fixes, and a need for faster cloud delivery, DevOps teams need a way to manage these issues. Watch this container development lab to understand the specifics behind container usage to help ease the burden on DevOps teams.
Posted: 02 Jul 2019 | Premiered: Mar 18, 2018

TOPICS:  CIOs | IT Management
Oracle Corporation

EMEA Cybercrime Report 2019 - Key Findings
sponsored by LexisNexis Risk Solutions
WEBCAST: In this webinar, Courtney Austin and Ellie Burns from LexisNexis Risk Solutions discuss key findings from the 2019 EMEA Cybercrime Report. Download the webinar to find out what is fueling cybercrime in the EMEA region.
Posted: 05 Sep 2019 | Premiered: Jul 31, 2019

LexisNexis Risk Solutions

Corelight Webcast: New SIEM on the Block -- Meet Humio
sponsored by Corelight
WEBCAST: Bro network security monitoring is an open source tool. It turns raw network traffic into comprehensive network logs organized by protocol, with key fields extracted specifically for security use cases. In this webcast, watch a demo to see how Corelight's technical integration with Humio allows you to economically monitor all your network traffic.
Posted: 28 Jan 2019 | Premiered: Aug 21, 2018

Corelight

CIO Coffee Talks 5
sponsored by Dimension Data
WEBCAST: Preparing for future digital projects is an intelligent proactive measure, but the rapid pace of change within IT landscapes makes this preparation challenging. Watch this short 7-minute conversation between two IT executives from Cisco and Dimension Data, and how they believe digital infrastructures may change.
Posted: 31 Jul 2019 | Premiered: Jul 31, 2019

Dimension Data

Establish Secure DevOps Practices
sponsored by Centrify Corporation
WEBCAST: The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development. However, security can be an afterthought when adopting these. In this webcast, explore DevSecOps and how it can help your organization take the "fast lane" through security into production.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

How to Automate an API Security Program
sponsored by Data Theorem
WEBCAST: Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.
Posted: 10 Jun 2019 | Premiered: Jun 10, 2019

Data Theorem

Okta + Shape: Stopping Identity Attacks in their Tracks
sponsored by Shape Security
VIDEO: In this short video, learn how Okta and Shape Security partnered up to offer a comprehensive identity-first security strategy that aimed to prevent both automated and targeted identity attacks.
Posted: 26 Aug 2019 | Premiered: 26 Aug 2019

Shape Security

Your Compliance Action Plan: Strategies To Control Time, Cost And Risk For Financial Services Firms
sponsored by Mimecast
WEBCAST: Financial services firms today face some of the most complex and onerous regulatory and legal challenges in the world. In this webcast, listen as Michael Osterman and Garth Landers guide financial services firms in navigating a clear and strategic path through the complex requirements they face to support governance requirements.
Posted: 31 Jul 2019 | Premiered: Jul 31, 2019

Mimecast

Accelerating Digital Transformation with Direct-to-Cloud Connectivity and Security
sponsored by Forcepoint
VIDEO: Enabling remote sites and off-network users to securely connect direct-to-cloud is the new challenge facing enterprises and government agencies. How can distributed organizations achieve the reliable, secure connectivity to the cloud they need? Tune into this webinar to learn more.
Posted: 11 Jun 2019 | Premiered: 11 Jun 2019

Forcepoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement