IT Management  >   Systems Operations  >   Security  >  

Virus Threats

RSS Feed   
Virus Threats Multimedia (View All Report Types)
 
Equifax and the 147 Million: One Individual’s Story from behind the Headlines
sponsored by Auth0
VIDEO: What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.
Posted: 20 May 2020 | Premiered: 30 Mar 2020

Auth0

Fidelis Extended Detection and Response (XDR)
sponsored by Fidelis
VIDEO: Security teams are responsible for more threats than ever before. As a result, security stacks are bloated, and analysts overloaded. What can security teams do to overcome this overload and get back to mounting coordinated responses? Take two minutes to watch this short video and exhibiting Fidelis’ Extended Detection & Response.
Posted: 15 Jan 2021 | Premiered: 15 Jan 2021

Fidelis

Security Compliance and Data Privacy the Open Source Way
sponsored by Red Hat
VIDEO: As our world grows increasingly data-driven, ensuring the privacy and security of customer data becomes a top priority for organizations – especially as each new compliance mandate is enforced. Watch this Red Hat webinar to learn more about the evolving landscape of data security and privacy.
Posted: 26 Jan 2021 | Premiered: 26 Jan 2021

Red Hat

NWN SecureX Online Workshop
sponsored by NWN Corporation
VIDEO: Today’s cybersecurity paradigm has completely changed – security programs are now in the spotlight of the board of directors and security teams are faced with mounting pressure on numerous fronts. Watch this webinar to learn more about today’s challenges and how NWN is helping organizations address them.
Posted: 24 Nov 2020 | Premiered: 24 Nov 2020

NWN Corporation

Auth0 Platform Introduction
sponsored by Auth0
WEBCAST: This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

Auth0

Office 365: Data Protection & Backups
sponsored by arcserve
VIDEO: Migrating to Office 365 equips organizations with the benefits of modern cloud environments. However, there are some challenges and considerations you need to be aware of, especially when it comes to data privacy and backups. Watch this short video to learn more.
Posted: 30 Nov 2020 | Premiered: 30 Nov 2020

arcserve

Keynote Tackling Security in the World of Containers and Hybrid Cloud
sponsored by Red Hat
WEBCAST: Placing security at the center of your organization’s processes, technology and culture is critical for addressing modern cyberthreats. This webinar features the Chief Security Architect, who offers best practices and strategic insight into successfully adopting a security culture – watch now to get started.
Posted: 22 Jan 2021 | Premiered: Jan 22, 2021

Red Hat

SIG - SASE Convergence of Cloud Security and Networking
sponsored by Cisco Umbrella
WEBCAST: It’s the new normal, and ensuring security for this cloud-centered reality is paramount. Businesses must deepen visibility, protection and control of internet traffic while simplifying security deployment and management. Watch this webinar to learn how Cisco is breaking new ground with a SASE as well as unified SD-WAN and cloud security offers.
Posted: 30 Jul 2020 | Premiered: Jun 30, 2020

Cisco Umbrella

How to Limit the Risk of Attack on your XP Assets
sponsored by AT&T Cybersecurity
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AT&T Cybersecurity

Webinar: 20 Critical Controls for Cyber Defense
sponsored by ISACA
WEBCAST: Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)

ISACA
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences