IT Management  >   Systems Operations  >   Security  >  

Security Network

RSS Feed   
Security Network Multimedia (View All Report Types)
 
Detecting and Defending Against SSRF
sponsored by WhiteHat Security
WEBCAST: Server-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

WhiteHat Security

Fortinet Accelerate Keynote March 2021
sponsored by Fortinet, Inc.
WEBCAST: As a remote enterprise, you must prioritize the security of your remote workforce as IT modernizes and transforms. Watch Fortinet’s 2021 Accelerate Keynote webinar to hear from cybersecurity leaders on how you can build, strengthen and improve your security senses in the age of accelerated digital transformation.
Posted: 06 Apr 2021 | Premiered: Mar 9, 2021

Fortinet, Inc.

How retailers can bridge the gap from 4G to 5G
sponsored by Cradlepoint
WEBCAST: 5G is projected to provide improved business continuity in an uncertain time, but how? As computing moves closer to the edge, network professionals will want to consider 5G to spearhead transformation. Jump into this webcast to get in-depth.
Posted: 05 Aug 2020 | Premiered: Aug 5, 2020

Cradlepoint

Best practices for CIOs to ensure business continuity during this pandemic
sponsored by Cloudflare
WEBCAST: During this COVID-19 crisis, every CIO’s key goal is to maintain business continuity — enable all employees, customers, partners, and vendors to continue working and collaborating seamlessly. In this webcast, explore the key essentials to ensure business and IT continuity during this crisis.
Posted: 08 May 2020 | Premiered: May 8, 2020

Cloudflare

SIG - Research Reveals: Network Security is Converging in the Cloud
sponsored by Cisco Umbrella
WEBCAST: View this video to learn why Gartner is introducing a new market category, the secure access service edge (SASE), which converges security services in the cloud. Get recommendations to help you shape your security for 2020 and keep it simple, scalable, and flexible.
Posted: 04 May 2020 | Premiered: May 4, 2020

Cisco Umbrella

Extreme Networks Video 1
sponsored by Extreme Networks
WEBCAST: As the internet of things (IoT) becomes increasingly popular, it changes the way organizations approach securing the devices connected to their network. Watch this webinar to learn more about IoT, including a comprehensive definition, and overview of associated security challenges, strategic best practices and more.
Posted: 29 Mar 2021 | Premiered: Mar 29, 2021

Extreme Networks

Shifting Pam Into High Gear with Zero Standing Privilege
sponsored by Remediant
WEBCAST: Since zero standing privilege was introduced in 2019, it’s considered as a strong addition to privileged access management (PAM). As it happens, admin credentials change over time, and older PAM approaches may not be enough to handle today’s modern threats. Watch this webcast to examine how zero standing access can have a positive effect.
Posted: 28 Aug 2020 | Premiered: May 21, 2020

Remediant

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AT&T Cybersecurity
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013

AT&T Cybersecurity

Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences