Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Secure Shadow IT with aPaaS

    Webcasts // Jan 2016 // provided by Intuit

    With as much as 30% of total IT budgets being spent outside of IT departments1, technical workarounds by the business, also known as "shadow IT", can no longer be ignored. In order to strike a necessary balance between IT control and business-driven efforts, many IT leaders are turning to ...

    Watch Now
  • Exercising the C-Suite: Gain IR Muscle

    Webcasts // Jan 2016 // provided by FireEye

    In this webinar, Mandiant Principal Consultant Matt Shaffer will examine how organizations involve their C-Suite in simulations and game activities to build awareness of best practices and common pitfalls. Join this webinar to learn how you can fully engage your C-suite and improve your organization’s security posture.

    Watch Now
  • Top 10 Security Predictions for 2016

    Webcasts // Jan 2016 // provided by FireEye

    It’s been a year of more-more cyber attacks in more industries. And health care has emerged as the target of the year, affecting the lives of millions of customers and employees. 2015 has also been the year of international cyber treaties to help curb attacks. What will the new ...

    Watch Now
  • Webinar: The Move to Mobile-Android and iOS Attacks

    Webcasts // Jan 2016 // provided by FireEye

    Cyber attacks that target mobile apps, such as Masque attacks, are on the rise—so much so that mobile is now the fastest growing threat vector to the enterprise. Get insights into a threat group that exploit using the iOS Masque attack, and be vigilant against cyber attacks on mobile ...

    Watch Now
  • You’ve been hacked. Now what?

    Webcasts // Dec 2015 // provided by FireEye

    A network breach is not a matter of if, but when. However many companies are still a long way from having a network security posture to effectively manage or respond to today’s evolving cyber threats. Having security systems in place within your network architecture is only half the battle; todays ...

    Watch Now
  • Ensuring the Success of your IAM Projects

    Webcasts // Aug 2015 // provided by Dell Software

    Identity and access management (IAM) projects are some of the most important (and difficult) activities that organizations must undertake. This on-demand webcast explores hundreds of companies and real-world projects to help you create a successful, affordable and sustainable IAM implementation. View the Webcast >>

    Watch Now
  • Harnessing Intelligence from Malware Repositories

    Webcasts // Dec 2015 // provided by

    The number of unique malware has been doubling every year for over two decades. The majority of effort in malware analysis has focused on methods for preventing malware infection. The presenters view the exponential growth of malware as an underutilized source of intelligence. Given that the number of malware authors ...

    Watch Now
  • Russian Cyber Threat Groups - Could they compromise your Twitter Handle?

    Webcasts // Nov 2015 // provided by FireEye

    Cyber threat groups frequently design innovative ways to cover their tracks. In early 2015, a new malware emerged, which the analysts are calling HAMMERTOSS, from an advanced persistent threat (APT) group. The Russian attacker group that FireEye knows as APT29, employs HAMMERTOSS to compromise its targets. Using a variety of ...

    Watch Now
  • Cloud Device Insecurity

    Webcasts // Nov 2015 // provided by

    The users' data is much safer at home than it is letting some corporation "Take care of it" for them, right? Security reviews for some of the top vendors' devices reveal many interesting findings. Like everything else, there are bugs.

    Watch Now
  • Does SDN Mean Security Defined Networking

    Webcasts // Oct 2015 // provided by

    The world of networking is changing rapidly. This change is also affecting the nature and effectiveness of security appliances, devices, and policies. As Software Defined Networking (SDN) moves from the lab to production, there are a variety of use cases that will enable information security departments to gain greater visibility ...

    Watch Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?