IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Tape Destruction

RSS Feed   
Tape Destruction Multimedia (View All Report Types)
Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

Darik's Boot and Nuke (DBAN)
sponsored by
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007

Secure Coding Practices: Avoid OS Command Injection Attacks
sponsored by WhiteHat Security
VIDEO: Watch this webcast to learn what an OS Command Injection does, where you can find it, and what damage it can do. Then, explore some best practices for avoiding, or mitigating the damage of these attacks.
Posted: 19 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

The ROI of AppSec: Getting your Money's Worth from your AppSec Program
sponsored by Veracode, Inc.
WEBCAST: Access this webcast to gain a better understanding of the impact of application security on the end-to-end software development value chain. Then, discover how much it really cost to fix security vulnerabilities in relation to application development.
Posted: 16 Jan 2018 | Premiered: Jan 16, 2018

Veracode, Inc.

Innovations in Adaptive Fraud Prevention
sponsored by Simility
WEBCAST: Listen to Kedar Samant and Lynn Strand of Simility as they discuss how an adaptive fraud prevention platform can help your organization stay protected against the latest threats.
Posted: 12 Mar 2018 | Premiered: Mar 12, 2018


Meltdown Spectre Mitigation with PowerShell and Process Automation
sponsored by Goverlan
WEBCAST: Uncover a deep dive into the Meltdown and Spectre security holes. This webinar details how to deploy security patches in a timely and systematic fashion on a large scale.
Posted: 02 Feb 2018 | Premiered: Jan 26, 2018


How to Get More Personal Data Without the Risk
sponsored by Evident
WEBCAST: According to Continuum, 3.7 million personal data records are stolen every day. Take an in-depth look at this webinar to gain insight into the worsening security problem facing enterprises today, the concern about safety of personal data, and tips for choosing a verification partner.
Posted: 01 Dec 2017 | Premiered: Dec 1, 2017


The Business of IT Transformation
sponsored by Rackspace
WEBCAST: Tune into this webcast to hear from the CIO and Digital CTO at Rackspace, who in detail dissect the term "digital transformation" and highlight the challenges driving businesses like yours to the cloud. They also run down an actionable cloud implementation checklist, for you to use as guidance.
Posted: 13 Oct 2017 | Premiered: Mar 29, 2017


How to Quickly Advance Your Security Posture
sponsored by Splunk
WEBCAST: In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.
Posted: 16 Oct 2017 | Premiered: Sep 29, 2017


Analytical Stories: How I Learned to Stop Worrying and Respond to Threats
sponsored by Splunk
WEBCAST: This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.
Posted: 13 Oct 2017 | Premiered: Sep 26, 2017


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement