Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Multimedia (View All Report Types)
26 - 50 of 124 Matches Previous Page  |  Next Page
Starbucks Combats Credential Stuffing and Account Takeover
sponsored by Shape Security
VIDEO: Starbucks' Director of InfoSec, Mike Hughes, joins the CEO of Shape Security for a conversation regarding the challenges of credential stuffing and account takeover at Starbucks and the industry at large. Tune in to hear about Starbuck's success with Shape Security's Blackfish.
Posted: 27 Aug 2019 | Premiered: 27 Aug 2019

Shape Security

Securing the Human Perimeter with Natural Language Understanding (NLU)
sponsored by Armorblox
VIDEO: Humans are the new perimeter. What exactly does that mean for your organization? Tune into this webinar to hear Doug Cahill from ESG discuss what the human perimeter is and how Natural Language Understanding (NLU) can help secure it.
Posted: 26 Aug 2019 | Premiered: 26 Aug 2019

Armorblox

Natural Language Understanding (NLU): A New Way to Fight Cyberattacks
sponsored by Armorblox
WEBCAST: In this webcast, listen as Garret Bekker from 451 Research and Anand Raghavan from Armorblox discuss the email threat landscape and how Armorblox leverages deep learning and natural language understanding to deliver more comprehensive and accurate data security.
Posted: 26 Aug 2019 | Premiered: Aug 26, 2019

Armorblox

Live Threat Briefing New Attack Trends in Retail
sponsored by Shape Security
WEBCAST: Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques.
Posted: 19 Aug 2019 | Premiered: Aug 19, 2019

Shape Security

Mimecast Cyber Resilience For Email
sponsored by Mimecast
WEBCAST: Listen as Joel Bedoford and Phillip Clark from Mimecast explore the current cyber resilience landscape for Australian businesses and unpack survey results from 257 IT decisions makers on the topic of Cyber Resilience for Email.
Posted: 01 Aug 2019 | Premiered: Aug 1, 2019

Mimecast

Your Compliance Action Plan: Strategies To Control Time, Cost And Risk For Financial Services Firms
sponsored by Mimecast
WEBCAST: Financial services firms today face some of the most complex and onerous regulatory and legal challenges in the world. In this webcast, listen as Michael Osterman and Garth Landers guide financial services firms in navigating a clear and strategic path through the complex requirements they face to support governance requirements.
Posted: 31 Jul 2019 | Premiered: Jul 31, 2019

Mimecast

The Five Most Dangerous New Attack Techniques and How to Counter Them
sponsored by RSA Conference
VIDEO: This SANS Institute keynote panel recorded at RSA Conference 2019 covers the latest threats, what's coming next, and how you can prepare. Watch now to learn more.
Posted: 31 Jul 2019 | Premiered: 31 Jul 2019

RSA Conference

NIST Cybersecurity Framework Explained
sponsored by RSA Conference
WEBCAST: Since its release by the NIST in 2014, the Cybersecurity Framework has been the topic of conversation across industry sectors. These comments prompted Framework enhancement and clarification, forging the update v1.1 release in 2018. This webcast focuses on the information presented in the update. Watch now to learn more.
Posted: 30 Jul 2019 | Premiered: Jul 30, 2019

RSA Conference

The Vulnerability Epidemic in Mobile Financial Apps
sponsored by Arxan
WEBCAST: A recent study examined the protective capabilities of more than 30 different financial services applications found on the Google Play store. In this webinar, Knight and Arxan chief scientist Aaron Lint discuss the report findings and share best practices to enhance mobile app protection.
Posted: 24 Jul 2019 | Premiered: Jul 24, 2019

Arxan

Data Theorem Interview Digital Anarchist RSA Conference 2019
sponsored by Data Theorem
VIDEO: In this interview from the 2019 RSA Conference, listen to Data Theorem's senior leaders, Himanshu Dwivedi and Doug Dooley, talk about the benefits of Data Theorem's newest API security product offerings.
Posted: 25 Jun 2019 | Premiered: 25 Jun 2019

Data Theorem

How to Deal with Fraudulent Counterfeit Apps
sponsored by Data Theorem
WEBCAST: A counterfeit app is an unauthorized app that exploits the reach and user of a brand or mobile app for financial gain. In this webinar, learn about the different types of counterfeit apps and how to spot them.
Posted: 24 Jun 2019 | Premiered: Jun 24, 2019

Data Theorem

Webinar: CCPA Explained
sponsored by Okera
WEBCAST: As privacy regulations like CCPA and GDPR continue to proliferate, organizations need to become proactive and avoid a free-for-all approach that can leave them vulnerable to massive fines. In this webcast, Mark Donsky, Head of Product at Okera discusses CCPA and how to best protect your customers' sensitive information to avoid costly penalties.
Posted: 21 Jun 2019 | Premiered: Jun 21, 2019

Okera

How to Automate an API Security Program
sponsored by Data Theorem
WEBCAST: Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.
Posted: 10 Jun 2019 | Premiered: Jun 10, 2019

Data Theorem

Is a Browser Isolation Solution the New "Sandbox" for Security?
sponsored by Menlo Security
VIDEO: Protecting organizations from web threats has typically been done with a proxy or DNS solution but a new approach has emerged. In this webcast, learn more why remote browser isolation technology adoption is on the rise, 3 critical requirements when selecting a practical isolation solution, and more.
Posted: 07 Jun 2019 | Premiered: 07 Jun 2019

Menlo Security

Avoid the Breach With Effective Application Security Testing
sponsored by HackerOne
WEBCAST: Security is a top priority for e-commerce giant Shopify. Join Shopify's Vice President of Security Engineering and IT, Andrew Dunbar in this webcast as he discusses best practices for testing and securing your cloud-based web applications. The session will also cover how you can scale application security for high-growth DevOps organizations.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019

HackerOne

The Top Industries at Risk for Cyber Attacks
sponsored by Barracuda
VIDEO: This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.
Posted: 29 May 2019 | Premiered: 31 Dec 2018

Barracuda

Email Protection with Asaf Cidon
sponsored by Barracuda
VIDEO: Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.
Posted: 29 May 2019 | Premiered: 01 Mar 2019

Barracuda

An Overview of Barracuda PhishLine
sponsored by Barracuda
VIDEO: The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.
Posted: 28 May 2019 | Premiered: 08 Feb 2019

Barracuda

Barracuda Lightboard: Total Email Protection
sponsored by Barracuda
VIDEO: This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.
Posted: 28 May 2019 | Premiered: 31 Jan 2019

Barracuda

Understanding and Preventing Finance Phishing Fraud
sponsored by Barracuda
WEBCAST: Today's hackers and cybercriminals are doubling-down to heavily target finance department employees and execs with fraudulent phishing emails. Why? To get the whole story on this fast-growing phishing threat and to view several new strategies for fighting back, join this webinar.
Posted: 24 May 2019 | Premiered: May 24, 2019

Barracuda

Top 10 Application Security Vulnerabilities for Developers
sponsored by WhiteHat Security
VIDEO: Join Mark Rogan, DAST Manager from the WhiteHat Security Threat Research Center, as he discusses the top vulnerabilities and gives valuable prevention tips for enterprises to implement.
Posted: 13 May 2019 | Premiered: 13 May 2019

WhiteHat Security

Webinar: Top 6 Security Needs for APIs and Serverless Apps
sponsored by Data Theorem
WEBCAST: In this webinar, discover the top 6 API security needs for APIs and apps across serverless platforms such as AWS Lambda, Google Cloud Functions and Azure Functions.
Posted: 12 Apr 2019 | Premiered: Apr 12, 2019

Data Theorem

Automate Compliance Audits Without the Staff
sponsored by Data Theorem
WEBCAST: Data security and privacy are top of mind issues for security leaders and corporate boards. However, Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation. In this webcast, learn how to automate the compliance and audit process.
Posted: 09 Apr 2019 | Premiered: Feb 1, 2019

Data Theorem

Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by WhiteHat Security
WEBCAST: There have been a number of data breaches in the news recently due to website vulnerabilities. In order to ensure your business isn't breached, incorporate security into your development process. In this webcast, explore key considerations for securing your web applications.
Posted: 01 Mar 2019 | Premiered: Mar 1, 2019

WhiteHat Security

Insider Threats Part 1: Identifying and Responding with Fidelis EDR Technology
sponsored by Fidelis
WEBCAST: Sometimes the biggest threat to your sensitive data is one of your own employees. In this webcast, Fidelis' Lucas Chumley and Louis Smith will demonstrate how to minimize the risk posed by an insider threat. Also, see how Fidelis technology can help identify and provide initial notification of a probable threat and then automate response.
Posted: 20 Feb 2019 | Premiered: Feb 20, 2019

Fidelis
26 - 50 of 124 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info