IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

e-Mail Decryption

RSS Feed   
e-Mail Decryption Multimedia (View All Report Types)
Secure Coding Practices: Avoid Mail Command Injection Attacks
sponsored by WhiteHat Security
VIDEO: Just what is web mail command injection, how does it happen, and what can you do to protect yourself? Get the answers to these questions and more in this webcast, where Zach Jones, Senior Director of TRC Static Analysis explores what makes these threats so unique, as well some best practices for mitigating the damage they can cause.
Posted: 19 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

How to Keep Your Containers Secure
sponsored by Aqua Security
WEBCAST: In a containerized deployment, how do you safely pass secrets - like passwords and tokens - between containers without compromising their safety? Watch this webcast to uncover the risks, and learn best practices for keeping your secrets secure.
Posted: 09 Mar 2018 | Premiered: Sep 28, 2017

Aqua Security

Cross-Site Scripting Attacks: Identify and Defend against Malicious Code
sponsored by WhiteHat Security
VIDEO: Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster.
Posted: 22 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
WEBCAST: According to a Ponemon Institute study, 59% of respondents believe cyber automation will reduce operating costs and 55% believe it will reduce personnel cost. This webcast offers insight into reducing cybersecurity costs through automation technologies.
Posted: 16 Feb 2018 | Premiered: Feb 16, 2018

Juniper Networks

ChatOps Smart Communications at University of Pretoria
sponsored by MicroFocus
WEBCAST: Using Micro Focus Service Manager ChatOps, the University of Pretoria was able to optimize its IT service management with a tool that allows IT staff to communicate anywhere and respond instantly. Tune into this video to learn more about this automated ITSM platform.
Posted: 05 Mar 2018 | Premiered: Jan 2, 2018


Advanced Threat Protection Integration
sponsored by Phantom Cyber
VIDEO: How is your enterprise protecting against looming threats? Explore this webcast with Phantom and Symantec to gain insight into integrating an advanced threat protection strategy to detect, investigate and respond to threats.
Posted: 26 Feb 2018 | Premiered: 21 Feb 2018

Phantom Cyber

Case Study: Accenture Changes the Dynamics of IT Ops
sponsored by MicroFocus
WEBCAST: Tune into this video to learn how to integrate IT operations across multiple vendors and environments using a containerized, service-oriented ops monitoring platform. Using real-time and predictive reporting with this platform can reduce incidents; deliver more actionable business insights; and more.
Posted: 05 Mar 2018 | Premiered: Dec 11, 2017


Forcepoint CASB: Visibility and Control of Cloud Applications
sponsored by Forcepoint
VIDEO: Watch this webcast to learn about 2 flexible CASB deployment options, as well as the 6 mission-critical capabilities they can provide.
Posted: 16 Feb 2018 | Premiered: 12 Feb 2018


Data Wars: A New Hope for IT & Security Insights
sponsored by Splunk
WEBCAST: In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.
Posted: 13 Oct 2017 | Premiered: Sep 28, 2017


Spectre and Meltdown Podcast
sponsored by RSA Conference
PODCAST: Spectre and Meltdown have the potential to affect personal computers, mobile devices, and cloud infrastructure dating back to 1995. Listen to this podcast to hear an expert take on the Spectre and Meltdown cyberthreats as well as tips and insights into protecting your sensitive data from the attacks.
Posted: 19 Mar 2018 | Premiered: Mar 19, 2018

RSA Conference

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement