IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Multimedia (View All Report Types)
1 - 25 of 270 Matches Previous Page  |  Next Page
Red Cloak Threat Detection & Responses
sponsored by Dell SecureWorks
WEBCAST: Secureworks has now released Red Cloak Threat Detection and Response, a cloud-based security analytics application that can help transform the way your security team detects, investigates and responds to threats. Download this webcast to hear John H. Collins, CISSP, discuss the key features of Red Cloak TDR.
Posted: 13 Sep 2019 | Premiered: Sep 13, 2019

Dell SecureWorks

Securing the Future Through Education
sponsored by Verodin
PODCAST: Tune into the Cybersecurity Effectiveness podcast to listen to Helen Patton, CISO for Ohio State University, talk about her thoughts on undergraduate university programs and the importance of providing guidance for students who are passionate about cybersecurity.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

Verodin

The Cybersecurity Effectiveness Podcast: Nick Andersen
sponsored by Verodin
PODCAST: As CISO of the State of Vermont, Nick Andersen is involved in everything from healthcare to emergency management to academia. In this podcast, listen as he and Brian dive into the crucial priorities for the state, differences between protecting state and business data, and establishing third-party relationships to neutralize risk.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

Verodin

The Cybersecurity Effectiveness Podcast: Mike Fabrico
sponsored by Verodin
PODCAST: Download this podcast to listen as Mike Fabrico, former specialist at NASDAQ and Senior Director at TrapX Security, breaks down deception as a strategy—not just a tool—to provide organizations with the ability to turn the tables on their opponents.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

Verodin

The Cybersecurity Effectiveness Podcast: MacKenzie Brown
sponsored by Verodin
PODCAST: In this podcast, listen as Microsoft Detection and Response Team (DART) consultant MacKenzie Brown describes how her love of theatre led her to her current work with incident response (IR) and becoming co-founder of the Ms. Greyhat Organization.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

Verodin

Getting Started with DevSecOps
sponsored by ZeroNorth
WEBCAST: Collaboration between development and security teams is key to DevSecOps transformation and involves both cultural and technological shifts. In this webcast, Andrei Bezdedeanu, ZeroNorth VP of Engineering, discusses how to get started with DevSecOps and the resulting benefits.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

ZeroNorth

Cybersecurity Effectiveness Podcast: Ed Amoroso
sponsored by Verodin
PODCAST: Tune into this episode of the Cybersecurity Effectiveness Podcast to hear Brian Contos chat with Ed Amoroso, former SVP and CSO of AT&T and current CEO of TAG Cyber LLC, about priorities and advice for building a top-notch security team.
Posted: 06 Sep 2019 | Premiered: Sep 6, 2019

Verodin

The Cybersecurity Effectiveness Podcast: Richard Seiersen
sponsored by Verodin
PODCAST: Seasoned cybersecurity veteran Richard Seiersen, current SVP & CISO at LendingClub and former VP of Trust and CISCO for Twillio, attributes success in any career to two things: metrics and measurement. In this podcast, he shares his contagious passion for security, the qualities of top engineers, his latest book, and more.
Posted: 06 Sep 2019 | Premiered: Sep 6, 2019

Verodin

Cybersecurity Effectiveness Podcast: Featuring Greg Martin
sponsored by Verodin
PODCAST: The Cybersecurity Effectiveness Podcast: The Age of the Intelligent SOC features JASK CEO and Co-Founder, Greg Martin. In this episode, hear his predictions about the key cybersecurity challenges that organizations will be facing in the near future as well as the ground-breaking developments in AI and SOC automation.
Posted: 05 Sep 2019 | Premiered: Sep 5, 2019

Verodin

The Cybersecurity Effectiveness Podcast: Richard Stiennon
sponsored by Verodin
PODCAST: In this podcast, listen to Richard Stiennon, serial author, industry expert, and Chief Research Analyst at IT-Harvest, discuss how security is maturing at the executive leadership level.
Posted: 05 Sep 2019 | Premiered: Sep 5, 2019

Verodin

Establish Secure DevOps Practices
sponsored by Centrify Corporation
WEBCAST: The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development. However, security can be an afterthought when adopting these. In this webcast, explore DevSecOps and how it can help your organization take the "fast lane" through security into production.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

Ulf Lindq Podcast
sponsored by Verodin
PODCAST: In this podcast episode, host Brian Contos and Dr. Ulf Lindqvist, the Senior Technical Director of SRI International's Computer Science Laboratory discuss the future of IoT devices, how the security industry has changed, and more. Tune in to learn more
Posted: 03 Sep 2019 | Premiered: Sep 3, 2019

Verodin

Security, Compliance & ERP
sponsored by SAP
PODCAST: In this comprehensive podcast, explore key issues and trends impacting security and compliance within ERP systems. Learn about the importance of incorporating a strong role mapping security profile framework during your ERP deployment, and review other essential tips for improving security and compliance within your organization.
Posted: 03 Sep 2019 | Premiered: Sep 3, 2019

SAP

Cybersecurity Effectiveness Podcast: Raj Samani
sponsored by Verodin
PODCAST: In a security professional's career, a nearly perfect success rate can be quickly and detrimentally tarnished by one mistake that puts the company at risk. In this podcast, Raj Samani, Fellow and Chief Scientist at McAfee, shares his professional journey in security.
Posted: 29 Aug 2019 | Premiered: Aug 29, 2019

Verodin

Cybersecurity Effectiveness Podcast: Malcolm Harkins
sponsored by Verodin
PODCAST: In this podcast, Cylance Chief Security and Trust Officer Malcolm Harkins reflects on his core leadership philosophies and the processes he implements to cultivate a professional culture of excellence. Listen as he discusses his transition from working at Intel, to joining the cybersecurity start-up, Cylance.
Posted: 29 Aug 2019 | Premiered: Aug 29, 2019

Verodin

The Cybersecurity Effectiveness Podcast: Bill Crowell
sponsored by Verodin
PODCAST: This podcast concentrates on the massive changes in cyberthreats over the last 15 years and how well the security industry has coped with those changes. Listen to Bill Crowell, who has a 57-year history in the Security and Intelligence world, and Brian Contos, CISO of Verodin, ransomware, DDoS attacks, APTs, and more.
Posted: 29 Aug 2019 | Premiered: Aug 29, 2019

Verodin

Cybersecurity Effectiveness Podcast: Terry Ray
sponsored by Verodin
PODCAST: According to Terry Ray, SVP, Fellow, and former CTO of Imperva, Inc., practices and safety around data privacy and the cloud, though slowly improving, still leave much to be desired. In this podcast, he and Brian Contos discuss the concept of absolute security.
Posted: 29 Aug 2019 | Premiered: Aug 29, 2019

Verodin

Webinar: Latest Fraud Schemes in Retail and Hospitality
sponsored by Shape Security
WEBCAST: Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.
Posted: 29 Aug 2019 | Premiered: Jul 31, 2019

Shape Security

Cybersecurity Effectiveness Podcast: IJay Palansky
sponsored by Verodin
PODCAST: While appealing new gadgets and innovative products continue to hit the market, legal firms caution organizations about the risks of IoT devices. In this podcast, technology-focused trial litigator IJay Palansky forecasts the impending boom of cyber litigation in the coming years and provides recommendations for avoiding an attack.
Posted: 28 Aug 2019 | Premiered: Aug 28, 2019

Verodin

Cybersecurity Effectiveness Podcast: Mark Bagley
sponsored by Verodin
PODCAST: Cyber threat research is not all created equal – especially in the realm of security instrumentation. In this podcast, Mark Bagley, VP of Product at Verodin, highlights the core objectives of the Behavioral Research Team (BRT) and provides direction for scaling your organization's defenses with improved durability and efficiency in mind.
Posted: 28 Aug 2019 | Premiered: Aug 28, 2019

Verodin

The New Frontiers of Identity
sponsored by SailPoint Technologies
WEBCAST: While digital transformation has opened new paths to success, it has also created new frontiers for identity governance that must be addressed. In this webcast, Paul Trulove of SailPoint explains how you can take a comprehensive approach to identity governance.
Posted: 28 Aug 2019 | Premiered: Aug 28, 2019

SailPoint Technologies

How Tier One Bank can Innovate Alongside Financial Aggregators
sponsored by Shape Security
VIDEO: Aggregators innovate but also add credential-stuffing threat surface, ATO risk, and more. In this video, learn the techniques and strategies that Fortune 500 Banks use to partner with aggregators and better serve clients.
Posted: 28 Aug 2019 | Premiered: 28 Aug 2019

Shape Security

Starbucks Combats Credential Stuffing and Account Takeover
sponsored by Shape Security
VIDEO: Starbucks' Director of InfoSec, Mike Hughes, joins the CEO of Shape Security for a conversation regarding the challenges of credential stuffing and account takeover at Starbucks and the industry at large. Tune in to hear about Starbuck's success with Shape Security's Blackfish.
Posted: 27 Aug 2019 | Premiered: 27 Aug 2019

Shape Security

Securing the Human Perimeter with Natural Language Understanding (NLU)
sponsored by Armorblox
VIDEO: Humans are the new perimeter. What exactly does that mean for your organization? Tune into this webinar to hear Doug Cahill from ESG discuss what the human perimeter is and how Natural Language Understanding (NLU) can help secure it.
Posted: 26 Aug 2019 | Premiered: 26 Aug 2019

Armorblox

Natural Language Understanding (NLU): A New Way to Fight Cyberattacks
sponsored by Armorblox
WEBCAST: In this webcast, listen as Garret Bekker from 451 Research and Anand Raghavan from Armorblox discuss the email threat landscape and how Armorblox leverages deep learning and natural language understanding to deliver more comprehensive and accurate data security.
Posted: 26 Aug 2019 | Premiered: Aug 26, 2019

Armorblox
1 - 25 of 270 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement