IT Management  >   Systems Operations  >   Security  >  

Software Security Threats

RSS Feed   
Software Security Threats Multimedia (View All Report Types)
 
Data Security: Best Practices for Remote Workers
sponsored by TITUS
WEBCAST: How do you tackle the issues associated with securing remote workers (such as easily compromised home Wi-Fi networks)? Tune into this webcast to hear experts walk you through best practices for securing your remote workforce and endpoints in today’s distributed enterprises.
Posted: 26 Jun 2020 | Premiered: Jun 26, 2020

TITUS

MSS | Tata Communications’ Network Attack Detection Platform
sponsored by TATA Communications
VIDEO: Oragnizations’ defenses may be taking up to 276 days to respond, and in today’s high-speed world, 3/4 of a year is not going to cut it. Your network needs to be readier for DDoS attacks than ever before, and network analytics may be what best prepares it. Watch this brief video to learn more about network analytics from Tata Communications.
Posted: 31 Jul 2020 | Premiered: 24 Feb 2020

TATA Communications

Secure Remote Access Readiness: Podcast
sponsored by Pulse Secure
PODCAST: Unplanned remote working can dramatically increase threat exposure, cyberattacks and data leakage risks. That means your organization needs to be prepared in the event of a global crisis. Learn how Pulse Secure enables business continuity and productivity with their secure remote access solution.
Posted: 25 Jun 2020 | Premiered: Jun 25, 2020

Pulse Secure

Panel Discussion: Securing the Cloud
sponsored by Dell SecureWorks
WEBCAST: The current pandemic has had considerable impacts on business environments and cloud usage – causing security leaders to revisit their cloud security strategies. In this webinar, join a panel of Secureworks security leaders as they explore the common challenges organizations are facing in securing their cloud environments.
Posted: 10 Aug 2020 | Premiered: Aug 10, 2020

Dell SecureWorks

How to Implement Zero Trust Security in Europe
sponsored by Okta
WEBCAST: Zero Trust has come a long way since its inception in 2009, but many still have questions. What should Zero Trust look like? How does it affect workloads, networks, people and devices within an organization? How can I begin to implement my own Zero-Trust model? Watch this webcast for answers to these questions and more from Forrester & Okta.
Posted: 01 Jul 2020 | Premiered: Sep 26, 2019

Okta

Third Party Script Application Security: Intrusion vs Detection
sponsored by Akamai Technologies
VIDEO: Emerging tactics among credit card skimming attacks are underlying the need to fortify security to stay ahead of these increasingly devastating campaigns. This 20-minute video provides a brief history of Magecart attacks and the rise of third-party scripts. Watch now to learn more about these threats and better understand how to mitigate them.
Posted: 31 Jul 2020 | Premiered: 31 Jul 2020

Akamai Technologies

Cybersecurity in Healthcare
sponsored by Egress Software Technologies Inc
WEBCAST: Healthcare is one the most highly targeted industries by cybercriminals. In this Osterman Research webinar, hear about various different types of breaches in the healthcare industry, what the hackers’ incentive was, and how organizations can implement protections.
Posted: 08 Apr 2020 | Premiered: Apr 8, 2020

Egress Software Technologies Inc

Equifax and the 147 Million: One Individual’s Story from behind the Headlines
sponsored by Auth0
VIDEO: What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.
Posted: 20 May 2020 | Premiered: 30 Mar 2020

Auth0

Cysiv SOC-as-a-Service
sponsored by Cysiv
VIDEO: In this video, learn about CYSIV SOC-as-a-Service, that delivers the benefits of having your own 24/7 fully staffed SOC, without the costs and complexities of running your own.
Posted: 20 Jul 2020 | Premiered: 20 Jul 2020

Cysiv

Threats Using Coronavirus as a Lure
sponsored by Trend Micro
WEBCAST: As the coronavirus continues to spread, so too does the wave of cyberattacks and campaigns that leverage the pandemic as their entry point. In this webinar, join Jon Clay, Director of Global Threat Communications at Trend Micro, as he highlights current threat trends and common tactics being used by hackers.
Posted: 26 May 2020 | Premiered: May 26, 2020

Trend Micro
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info