Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Live Webcast - How to make the right network security shortlist decisions

    Webcasts // Mar 2016 // provided by Dell

    As a security leader, you‘re aware that choosing the right technology partner for your long-term security strategy can be one of the most nerve-wracking, but crucial, tasks you must undertake. Making a poor choice could end up costing your organization millions, damaging your brand, and possibly even ending your career. ...

    Register Now
  • Top 10 Security Predictions for 2016

    Webcasts // Mar 2016 // provided by FireEye

    2015 was filled with one-off incidents, but it also saw plenty of longer-term activity from advanced actors. With the attack surface and threat landscape constantly shifting and evolving, next year is bound to keep IT staffers, vulnerability seekers and security researchers hard at work. In 2016, we have our ...

    Register Now
  • Sophos Synchronised Security Webcast

    Webcasts // Feb 2016 // provided by Sophos

    This webcast introduces Sophos' Synchronised Security solution, explaining the motivation behind its creation, how the solution works and how it makes the lives of IT decision makers and the IT department easier. By automating threat discovery, investigation, and response, Synchronized Security revolutionizes threat detection. Incident response times are reduced exponentially ...

    Register Now
  • Secure Shadow IT with aPaaS

    Webcasts // Jan 2016 // provided by QuickBase

    With as much as 30% of total IT budgets being spent outside of IT departments1, technical workarounds by the business, also known as "shadow IT", can no longer be ignored. In order to strike a necessary balance between IT control and business-driven efforts, many IT leaders are turning to ...

    Watch Now
  • Exercising the C-Suite: Gain IR Muscle

    Webcasts // Jan 2016 // provided by FireEye

    In this webinar, Mandiant Principal Consultant Matt Shaffer will examine how organizations involve their C-Suite in simulations and game activities to build awareness of best practices and common pitfalls. Join this webinar to learn how you can fully engage your C-suite and improve your organization’s security posture.

    View this now
  • Top 10 Security Predictions for 2016

    Webcasts // Jan 2016 // provided by FireEye

    It’s been a year of more-more cyber attacks in more industries. And health care has emerged as the target of the year, affecting the lives of millions of customers and employees. 2015 has also been the year of international cyber treaties to help curb attacks. What will the new ...

    View this now
  • Webinar: The Move to Mobile-Android and iOS Attacks

    Webcasts // Jan 2016 // provided by FireEye

    Cyber attacks that target mobile apps, such as Masque attacks, are on the rise—so much so that mobile is now the fastest growing threat vector to the enterprise. Get insights into a threat group that exploit using the iOS Masque attack, and be vigilant against cyber attacks on mobile ...

    Watch Now
  • You’ve been hacked. Now what?

    Webcasts // Dec 2015 // provided by FireEye

    A network breach is not a matter of if, but when. However many companies are still a long way from having a network security posture to effectively manage or respond to today’s evolving cyber threats. Having security systems in place within your network architecture is only half the battle; todays ...

    Watch Now
  • Ensuring the Success of your IAM Projects

    Webcasts // Aug 2015 // provided by Dell Software

    Identity and access management (IAM) projects are some of the most important (and difficult) activities that organizations must undertake. This on-demand webcast explores hundreds of companies and real-world projects to help you create a successful, affordable and sustainable IAM implementation. View the Webcast >>

    Watch Now
  • Harnessing Intelligence from Malware Repositories

    Webcasts // Dec 2015 // provided by SecurityTube.net

    The number of unique malware has been doubling every year for over two decades. The majority of effort in malware analysis has focused on methods for preventing malware infection. The presenters view the exponential growth of malware as an underutilized source of intelligence. Given that the number of malware authors ...

    Watch Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?