IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Signatures

RSS Feed   
Signatures Multimedia (View All Report Types)
 
Sophisticated Cyber Attacks and Trends in Online Fraud
sponsored by Shape Security
VIDEO: In this video, listen to Dan Woods, former FBI agent, discuss sophisticated cyberattacks and trends in online fraud.
Posted: 26 Aug 2019 | Premiered: 26 Aug 2019

Shape Security

Assessing the Security and Compliance Posture of an AWS Account and Its Assets
sponsored by CloudPassage
VIDEO: CloudPassage Halo is a cloud security platform for severless, server-based and containerized assets in public and hybrid cloud environments. In this video, watch a demo of how Halo Cloud Secure can assess the security and compliance posture of an AWS account and the assets it contains.
Posted: 10 Oct 2019 | Premiered: 10 Oct 2019

CloudPassage

Top 10 Application Security Vulnerabilities for Developers
sponsored by WhiteHat Security
VIDEO: Join Mark Rogan, DAST Manager from the WhiteHat Security Threat Research Center, as he discusses the top vulnerabilities and gives valuable prevention tips for enterprises to implement.
Posted: 13 May 2019 | Premiered: 13 May 2019

WhiteHat Security

The Top Industries at Risk for Cyber Attacks
sponsored by Barracuda
VIDEO: This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.
Posted: 29 May 2019 | Premiered: 31 Dec 2018

Barracuda

Fidelis Deception Demo
sponsored by Fidelis
WEBCAST: Download this video for an overview of Fidelis Deception. In the video, you'll learn how to use Fidelis to map your network and understand your terrain, how to deploy deception and more.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

Fidelis

Web App Firewall Webinar
sponsored by Tala Security
VIDEO: In the past couple of years, organizations have seen a spike in attacks that are focused on getting malicious crypto into the browser in order to exfiltrate data. In this video, Aanand Krishnan from Tala Security discusses how your organization is exposed to web application attacks on the browser side and how to protect your organization.
Posted: 16 Oct 2019 | Premiered: 16 Oct 2019

Tala Security

Is Fax the Achilles Heel of Your Compliance and Cybersecurity Plan
sponsored by J2 Cloud Services
WEBCAST: Today, many organizations have little to no security and compliance strategies for fax machines, printers or services. This represents a very real vulnerability. In this webcast, Aaron Goldberg, CEO of Content 4 IT and Brad Spannbauer, Senior Director of Product Management at J2 Cloud Services, discuss 5 fax security disasters in the making.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

J2 Cloud Services

SD-WAN with Enterprise Scale and Security in Action
sponsored by Forcepoint
WEBCAST: Find out how you can manage your network and boost connectivity no matter how spread out your enterprise is with a scalable SD-WAN platform, combined with the industry's top-rated next-gen firewall—all managed at enterprise scale from a single policy-based console.
Posted: 07 Aug 2019 | Premiered: Aug 7, 2019

Forcepoint

Privileged Access Management as a Service: What's in it for You?
sponsored by CyberArk Software, Inc
WEBCAST: In this webcast, learn how privileged access management as a service benefits your organization to help you stay secure.
Posted: 08 Oct 2019 | Premiered: Oct 8, 2019

CyberArk Software, Inc

HOL: Containerized Development with Docker
sponsored by Oracle Corporation
WEBCAST: The emergence of container development has provided IT teams a real solution to consolidate on-premise applications within virtual machines Follow this virtual workshop to understand how your business can realistically implement containers and improve application efficiencies.
Posted: 02 Jul 2019 | Premiered: Feb 28, 2018

Oracle Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement