Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Nov 2011

    Google I/O 2010 - Exploring the Google PowerMeter API

    In this webcast, the presenters will discuss interesting ways to make users understand and manage their home energy use through Google PowerMeter. The Google PowerMeter API currently available allows devices to integrate with Google PowerMeter.

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Google I/O 2010 - The Open & Social Web

    In this webcast, the presenter will cover the latest and most important trends of the Social Web and dive deep into where this is all going, at both technical and conceptual levels. From the concepts of digital identity, relationships, and social objects. The presenter will also cover emerging technologies like...

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Google I/O 2010 - Where Is the Social Web Going Next?

    With the advent of social protocols like OAuth, OpenID and ActivityStrea.ms, it's clear that the web has gone social and is becoming more open. In this webcast, the presenter will discuss the importance of such emerging technologies, how they've adopted them in their products and debate what's next.

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Google I/O 2010 - OpenID-Based SSO & OAuth for Google Apps

    In this webcast, the presenter will discuss about the auth tangles that the user have encountered so far - OpenID, SSO, 2-Legged OAuth, 3-Legged OAuth, and Hybrid OAuth. The presenter will show the user when and where to use the APIs, code some example apps, and demonstrate how they all...

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Google I/O 2010 - What's the Hubbub About Google Buzz APIs?

    Google Buzz is a new way to share updates, photos, videos and more, and start conversations about the things the user find interesting. In this webcast, the presenters will take a deep dive into building with the Buzz APIs and the open standards it uses, such as ActivityStrea.ms, PubSubHubbub, OAuth,...

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Critical Control System Vulnerabilities Demonstrated - And What to Do About Them

    Control systems are embedded in most industries to automate the production, delivery and safe storage of the food and drinks the people consume, the transportation people take, the chemicals people process, and the energy people utilize. These systems, some of which are being connected directly to the Internet, are increasingly...

    Provided By NitroSecurity

  • Webcasts // Oct 2011

    Google I/O 2008 - OpenSocial, OpenID, and OAuth: Oh, My!

    A number of emerging technologies will soon collectively enable an open social web in which users control their information and it can flow between multiple sites and services. OpenID, OAuth, microformats, OpenSocial, the Social Graph API, friends-list portability, and more will be discussed, as well as a coherent vision for...

    Provided By Oleksiy Kovyrin

  • Webcasts // Oct 2011

    Google I/O 2008 - Authenticating to Google Data Services

    Get over that first hurdle in the users prototype! Authenticating a user is a tricky, but necessary step for most applications that interact with Google services. In this webcast, the presenter will discuss the available authentication options, their limitations, and some advanced use cases such as Google Apps domains and...

    Provided By Oleksiy Kovyrin

  • Webcasts // Oct 2011

    Google I/O 2009 - The Social Web: An Implementor's Guide

    The web is going social and the social web is going open - come and learn the latest ways to build their website into this social ecosystem. Reduce sign-up friction with OpenID and OAuth hybrid on-boarding. Use Portable Contacts to tap their users' social graph without scraping. Let them promote...

    Provided By Oleksiy Kovyrin

  • Webcasts // Oct 2011

    Monitoring and Securing SCADA Networks

    SCADA networks are just different. Compared to enterprise IT networks, they have different security objectives, most of the endpoint actors are machines rather than people, their incidents can have immediate physical consequences, and they are more likely to be targeted by hostile actors such as terrorists. Moreover, SCADA networks must...

    Provided By NitroSecurity

  • Webcasts // Oct 2011

    Google I/O 2011: Identity and Data Access: OpenID and OAuth

    Use OpenID and OAuth to stop requiring the users to type usernames and passwords. In this webcast, the presenters will demonstrate how to improve the experience and lower barriers to entry for their application by using OpenID.

    Provided By Oleksiy Kovyrin

  • Webcasts // Oct 2011

    Screencast: Lower Costs with Oracle Database 11g (related to Lower Costs)

    Discover the benefits of upgrading and consolidating with Oracle Database 11g and Oracle Exadata, to help reduce IT costs and increase business users quality of service throughout the enterprise.

    Provided By Oracle

  • Webcasts // Oct 2011

    Screencast: Oracle Database Firewall

    What is a database firewall? What are the important selection criteria in choosing a database firewall? These questions and more are answered by Vipin Samar, Vice President of Oracle Database Security.

    Provided By Oracle

  • Webcasts // Oct 2011

    How Well Do You Know SSL?

    The presenter, talks about the research done by SSL Labs. SSL Labs is a collection of documents, tools and thoughts related to SSL. It's a non-commercial research effort to better understand how SSL is deployed, and an attempt to make it better.

    Provided By HELP NET SECURITY

  • Webcasts // Oct 2011

    Oracle OpenWorld 2011: BIG-IP ASM & Oracle Database Firewall

    In this webcast, the presenter describes about the BIG-IP ASM and Oracle Database Firewall integration. The presenter also describes about Oracle Database Firewall which will secure and protect both the web and database tiers.

    Provided By F5 Networks

  • Webcasts // Oct 2011

    Konica Minolta on Transforming Enterprise IT Through Cloud Computing

    On demand version of this webinar. Konica Minolta Business Solutions U.S.A. (Konica Minolta) needed to easily integrate multiple corporate acquisitions, move from an old-style on-premise email system, and transform IT's role from tactical to strategic - so the company chose Google Apps. Today, Google Apps not only provides email, but...

    Provided By Google

  • Webcasts // Oct 2011

    Microsoft Exchange or Google Apps? One government agency goes Google

    On demand version of this webinar. Overview: James Ferreira, CIO for the New Mexico State Attorney General's office, had a choice to make to support his growing organization: upgrade to a more costly enterprise license for Microsoft Exchange or find a business grade alternative at a better price. Ferreira investigated...

    Provided By Google

  • Webcasts // Oct 2011

    Is your network ready for tablets?

    Review the various wireless controller options, video applications for the LAN and WAN, and wireless management control and security strategies that best address new networking demands brought on by data center consolidation, increasing video traffic, and increasing mobile device trends.

    Provided By Cisco Systems, Inc.

  • Webcasts // Oct 2011

    Guy-Philippe Goldstein: How Cyberattacks Threaten Real-World Peace

    More and more, nations are waging attacks with cyber weapons - silent strikes on another country's computer systems that leave behind no trace. In this Webcast, the presenter shows how cyberattacks can leap between the digital and physical worlds to prompt armed conflict- and how one might avert this global...

    Provided By TED Conferences

  • Webcasts // Sep 2011

    Security Management 2.0: Time to Replace Your SIEM?

    In this webcast, the presenters say about the reality is that many organizations have spent millions and years trying to get productivity out of their SIEM - with mediocre results. Most security teams need to start asking themselves some key questions: Is it time? Any one waving the white flag?...

    Provided By NitroSecurity

  • Webcasts // Sep 2011

    Best Practices to Optimize Performance in eCommerce Production Environments

    In this webinar with retailer The Bon-Ton Stores, learn how they've successfully overcome issues in operating a complex Websphere production e-commerce site to ensure optimal Web application performance and user experience. Dan Gerard, Divisional Vice President of Technical and Web Services at The Bon-Ton Stores, joins to discuss: Overcoming...

    Provided By dynaTrace software

  • Webcasts // Aug 2011

    OSA Interactive Client References Interface on IBM.COM

    Interactive interface for viewing OSA client reference videos and case studies.

    Provided By IBM

  • Webcasts // Aug 2011

    Trends in Business Analytics

    In his presentation "Trends in Business Analytics", Colin White (Founder, BI Research) will explore the impact that trends such as analytic RDBMSes, Hadoop and MapReduce, the NoSQL movement, smarter and real-time analytics, and self-service business intelligence will have on businesses. He will also examine the ways these trends can be...

    Provided By IBM

  • Webcasts // Aug 2011

    Next Generation Security as a Service

    The new UI for the QualysGuard IT Security and Compliance SaaS Suite features interactive dashboards, streamlined workflows, actionable menus and filters with improved visual feedback, making it easier for customers to utilize the comprehensive services in the QualysGuard Suite.

    Provided By HELP NET SECURITY

  • Webcasts // Aug 2011

    Live Webcast: IT Budget Killer Series - Taming Data Growth Made Easy

    Your data continues to grow at a staggering rate. Along with the ever increasing volume of data comes the demand for more storage and increased burden of managing a larger storage infrastructure. And overgrown databases can impair the performance of your mission-critical ERP, CRM and custom applications--jeopardizing the superior service...

    Provided By IBM

  • Webcasts // Aug 2011

    Rethinking the Corporate Network

    Today's corporate networks face unprecedented levels of stress as they try to handle new devices, applications, and technologies. New demands, such as smartphones, tablets, cloud-based services, and virtualization have dramatically changed the way corporate networks need to be designed to deliver a high-quality user experience. But these changes...

    Provided By Alcatel Lucent Enterprise

  • Webcasts // Jul 2011

    When Good Backups Go Bad

    This webcast addresses the top reasons backups fail, the repercussions of those failures, and why it doesn't have to be this way. Attendees will attain a broad understanding of backup and data recovery pitfalls, the serious consequences of those failures, and what to look for in a data recovery solution...

    Provided By Symantec

  • Webcasts // Jul 2011

    Actionable Intelligence From Advanced SIEM Systems

    In this webcast, the presenters say about to make better, faster security decisions for one organization, one need better information faster. Capturing the existing network event, log and flow data already provided by one infrastructure with a Security Information and Event Monitoring (SIEM) solution is the first key step to...

    Provided By NitroSecurity

  • Webcasts // Jul 2011

    Webcast: Why be Social?

    Just as the dawn of e-business changed business forever, ten years later organizations find themselves at another junction point in the evolution of business: the coming of age for Social Business as social computing and social media are integrated into enterprise design. Social Businesses outperform their competitors by embracing social...

    Provided By IBM

  • Webcasts // Jul 2011

    When No Press is Good Press - July 2011

    Yesterday's approaches to combating malware are no longer sufficient. Already this year we've seen an extraordinary number of high-profile security breaches. Whether you're a small business or a large enterprise, a breach of your business's private information can be devastating. Yet many companies continue to play the odds, failing to...

    Provided By Symantec

  • Webcasts // Jul 2011

    Mikko Hypponen: Fighting Viruses, Defending the Net

    It's been 25 years since the first PC virus (Brain A) hit the net, and what was once an annoyance has become a sophisticated tool for crime and espionage. The presenter who is a computer security expert tells the people how they can stop these new viruses from threatening the...

    Provided By TED Conferences

  • Webcasts // Jul 2011

    Rebecca MacKinnon: Let's Take Back the Internet

    In this webcast, the presenter describes the expanding struggle for freedom and control in cyberspace, and asks: how do they design the next phase of the Internet with accountability and freedom at its core, rather than control? She believes the internet is headed for a "Magna Carta" moment when citizens...

    Provided By TED Conferences

  • Webcasts // Jun 2011

    Security in Google Apps

    Security concerns are all too frequently cited as a key reason that businesses and organizations choose not to embrace cloud computing, despite potential benefits in terms of reduced cost and administrative overhead. Google Apps, the online productivity and groupware suite, has a number of security features built in, both from...

    Provided By TechRepublic

  • Webcasts // Jun 2011

    Removing Administrator Rights & Setting up Policies to Elevate Privileges

    In this 35 minute webcast recording, you'll learn how to discover user accounts and groups that are members of the local "Administrators" built-in user group on computers in your Windows domain. Once the analysis has been run, we'll show you how to can take action, if needed, by removing the...

    Provided By Viewfinity

  • Webcasts // Jun 2011

    Seattle Children's Hospital Implements Desktop Virtualization

    View this webinar to learn how Seattle Children's Hospital was able to successfully deal with compliance issues, security requirements, budget constraints and more, all while ensuring a high quality user experience with Citrix XenDesktop and Wyse Xenith.

    Provided By Citrix & WYSE

  • Webcasts // Jun 2011

    African Elections And Democracy

    Nations across Africa are holding elections, a good sign for emerging democracies on the continent. However, the presenter says the quality of governance in African nations varies widely. Some states are making solid progress toward becoming effective democracies, while others remain under the sway of corrupt leaders, with serious consequences...

    Provided By Brookings Institution

  • Webcasts // Jun 2011

    On-Demand Webcast: Getting Network Out of Gridlock

    Building a network is easy. What isn't easy is avoiding the gridlock that comes with adding new technologies, applications, and end users to the mix. This network congestion can cost your company tens of thousands of dollars per hour while grinding your business to a halt. In this on-demand...

    Provided By Dell Software

  • Webcasts // May 2011

    Operational Data Quality - Data Governance

    Poor data in your business applications often originates from data quality problems in upstream operational systems. That's why it's critical to establish a Data Governance initiative to set standards, improve quality, and monitor how data supports business processes moving forward. Learn how Digital River successfully implemented Data Governance across their...

    Provided By Trillium Software

  • Webcasts // May 2011

    Non-Compliance Costs: Should Your Organization Invest in GRC Tools?

    Compliance regulations are increasing in quantity and complexity. Many organizations are staying on-top of compliance requirements by leveraging an integrated governance, risk and compliance (GRC) framework. Although (GRC) best practices are being adopted as the solution for non-compliance by many, how do you decide whether your organization needs a GRC...

    Provided By ANXeBusiness Corp

  • Webcasts // May 2011

    VIPRE Antivirus Business

    Until now antivirus has been slow and hard to manage - but there is a fast and easy solution, VIPRE Antivirus Business! VIPRE Business offers Fast endpoint protection Easy deployment and manageability Reliable detection and remediation - all at an affordable price!

    Provided By GFI Software