IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Multimedia (View All Report Types)
51 - 75 of 194 Matches Previous Page  |  Next Page
Equifax and the 147 Million: One Individual’s Story from behind the Headlines
sponsored by Auth0
VIDEO: What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.
Posted: 20 May 2020 | Premiered: 30 Mar 2020

Auth0

Backup: A Critical Security Tool as you Transition to a Fully Remote Workforce
sponsored by Barracuda
VIDEO: In this webinar presented by Stasia Hurley, Senior Product Marketing Manager for data protection at Barracuda, see why making sure your backup strategy up to date is especially important during the COVID-19-caused transition.
Posted: 12 May 2020 | Premiered: 12 May 2020

Barracuda

Scaling and Protecting Websites stretched by COVID-19
sponsored by Barracuda
WEBCAST: The COVID-19 crisis is forcing organizations to dramatically accelerate the shift to doing business online. This means you’re suddenly ramping up the web applications that your business depends on. Join this webinar to get advice on how to stay secure while rapidly scaling up capacity.
Posted: 06 May 2020 | Premiered: May 6, 2020

Barracuda

3 steps to secure remote workers and students
sponsored by Cisco Umbrella
VIDEO: As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.
Posted: 05 May 2020 | Premiered: 30 Mar 2020

Cisco Umbrella

Securing Your Business During the COVID-19 Crisis
sponsored by Barracuda
WEBCAST: Like you, Barracuda is adjusting to having everybody working from home. That’s why they’ve created a new webinar that shares insights about the key security challenges that this change entails, and how to overcome them. View now to gain actionable insights about how to keep your business secure in this extraordinary time.
Posted: 05 May 2020 | Premiered: May 5, 2020

Barracuda

SIG - Virtual Cloud Security Summit: Securing Your Network from the Cloud
sponsored by Cisco Umbrella
VIDEO: With organizations continuing to embrace cloud migration, a shift in security is also necessary to maintain the protection of cloud-native workloads. In this video, discover how Cisco Umbrella unifies security capabilities for cloud users to ensure safe adoption and access. Watch now to get started.
Posted: 04 May 2020 | Premiered: 02 Apr 2020

Cisco Umbrella

SIG - Research Reveals: Network Security is Converging in the Cloud
sponsored by Cisco Umbrella
WEBCAST: View this video to learn why Gartner is introducing a new market category, the secure access service edge (SASE), which converges security services in the cloud. Get recommendations to help you shape your security for 2020 and keep it simple, scalable, and flexible.
Posted: 04 May 2020 | Premiered: May 4, 2020

Cisco Umbrella

Protecting Business and Remote Workers from Covid-19 Email Threats
sponsored by Barracuda
VIDEO: The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.
Posted: 21 Apr 2020 | Premiered: 21 Apr 2020

Barracuda

Discovery Inc. | Case Study
sponsored by DivvyCloud
VIDEO: In this case study, find out how DivvyCloud allows Discovery to automate governance, offer flexibility, allow better insight and tighter controls and enhance compliance.
Posted: 08 Apr 2020 | Premiered: 08 Apr 2020

DivvyCloud

Extending Secure Access to Remote Workers
sponsored by Barracuda
WEBCAST: These are extraordinary times, and the sudden shift to a very widespread remote-work model is creating security and network-administration challenges that you may never have faced before. Join this webinar to find out how you can ensure secure and reliable access to online resources for all your users.
Posted: 07 Apr 2020 | Premiered: Apr 7, 2020

Barracuda

Cryptomining - How Cryptocurrency is Changing Cyber Security
sponsored by Cisco Umbrella
WEBCAST: The days of ransomware are not over, but the more ominous threats facing us now are cryptojacking, miners, and crypto exchange phishing. Is your environment safe? View this webcast to learn everything you need to know about cryptocurrency, cryptojacking, and how you can protect yourself.
Posted: 10 Mar 2020 | Premiered: Mar 10, 2020

Cisco Umbrella

Implementing Privacy Policy: Scaling Your Data Privacy Program
sponsored by Ionic Security
VIDEO: View this Ionic Security demo to see scalable and consistent data protection in action ⁠— through the lens of a custom HR app.
Posted: 27 Feb 2020 | Premiered: 27 Feb 2020

Ionic Security

Why DevOps Has Not Become DevSecOps Yet
sponsored by WhiteHat Security
WEBCAST: DevSecOps is facing a crisis known to most new technologies: what are the expectations of the technology, and what are the realities? In this webinar, WhiteHat debunks popular DevSecOps myths to understand the actual state of security automation today. Watch the webinar here.
Posted: 13 Jan 2020 | Premiered: Jan 13, 2020

WhiteHat Security

DevSecOps Framework
sponsored by WhiteHat Security
WEBCAST: DevSecOps involves many different team members, all with different responsibilities, priorities, and end goals. Thankfully, security automation enables collaboration. Watch this webinar to see how DevSecOps can influence better teamwork – and security practices.
Posted: 10 Jan 2020 | Premiered: Jan 10, 2020

TOPICS:  Security
WhiteHat Security

Secure Coding Practices: Use Software Composition Analysis
sponsored by WhiteHat Security
WEBCAST: Software composition analysis (SCA) is now a necessary process in application development. Why? Because only 10% of code is written end-to-end by an organization’s developers. Let’s say that another way: applications are built with 90% borrowed code. Watch this webinar to understand and compare your security options.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security | Software
WhiteHat Security

CASE STUDY: Tricentis slams the door on C-level email attacks using Barracuda Sentinel
sponsored by Barracuda
VIDEO: Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.
Posted: 08 Oct 2019 | Premiered: 31 May 2019

Barracuda

DomainTools Guide to Threat Hunting with Splunk and Phantom
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. The first step to integrating threat hunting into your organization is establishing a true threat hunting program. In this webcast, learn about a number of threat hunting essentials.
Posted: 14 Jan 2019 | Premiered: Jan 14, 2019

DomainTools

The Beginner's Guide to Threat Hunting
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.
Posted: 11 Jan 2019 | Premiered: Dec 31, 2018

DomainTools

Discover the Benefits of Database as a Service
sponsored by Oracle Corporation UK Ltd
VIDEO: Watch this video to learn about a Oracle's Exadata and SuperCluster Engineered Systems that deliver extreme database performance—while reducing costs and complexity.
Posted: 02 Feb 2015 | Premiered: 18 Jul 2014

Oracle Corporation UK Ltd

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Understanding the Ins & Outs of Java Vulnerabilities and What to do About it
sponsored by Lumension
WEBCAST: Many companies are calling for the death of Java, citing too many security vulnerabilities and risks to keep the platform sustainable. View this on-demand webcast to find out how to eliminate as much exploitable surface area as possible on your critical endpoints.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

Java Insecurity: How to Deal with the Constant Vulnerabilities
sponsored by Lumension
WEBCAST: Access this on-demand webcast to hear from Randy Franklin Smith, from Ultimate Windows Security, as he discusses the wide-ranging Java security changes Oracle is promising to make. Also discover what you can do now to address Java security in your environment.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

Overcoming the Challenges of Internal API Programs
sponsored by Intel® Services
WEBCAST: Modernizing legacy applications can be handled gracefully when the right API system is considered from the very beginning. View this webcast now to find out how to overcome cultural obstacles in implementing an internal API program, and how to present the value of having such a program.
Posted: 04 Nov 2014 | Premiered: Nov 4, 2014

Intel® Services

SQL Compliance Manager: Go beyond traditional auditing approaches with real-time monitoring
sponsored by Idera
SOFTWARE DOWNLOAD: DBAs are tasked with the monumental job of providing an accurate audit trail of SQL Server activities and auditing sensitive data. SQL compliance manager goes beyond traditional approaches with its real-time monitoring and auditing of all data access, updates, data structure modifications and changes to security permissions. Take a test drive now.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

Security Operations Center (SOC) Essentials for the SME
sponsored by AT&T Cybersecurity
WEBCAST: Watch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.
Posted: 16 Jun 2014 | Premiered: Jun 16, 2014

AT&T Cybersecurity
51 - 75 of 194 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences