ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Multimedia

  • Secure Coding Practices: Avoid OS Command Injection Attacks

    Sponsored by: Whitehat Securities

    Watch this webcast to learn what an OS Command Injection does, where you can find it, and what damage it can do. Then, explore some best practices for avoiding, or mitigating the damage of these attacks.

  • Getting Started with Secure DevOps

    Sponsored by: Veracode, Inc.

    Find out how to extend the collaborative efforts between developers and IT operations to your security pros as well so that you can shift towards a DevSecOps culture and incorporate app security as early and often into the development lifecycle as you can.

  • Webinar: What Machine Learning Can (and Can't) do to Help Solve Today's Mobile Security Problems

    Sponsored by: Lookout

    Watch this webinar to discover what machine learning can and can't do to help solve today's top mobile security concerns.

  • Unified MTD + MARS is the Best Practice for Mobile Security

    Sponsored by: Lookout

    Download this webcast to understand the full mobile risk matrix and discover how mobile threat defense (MTD) combined with mobile app reputation services (MARS) can protect your organization from mobile threats to apps, devices, networks and more.

  • The ROI of AppSec: Getting your Money's Worth from your AppSec Program

    Sponsored by: Veracode, Inc.

    Access this webcast to gain a better understanding of the impact of application security on the end-to-end software development value chain. Then, discover how much it really cost to fix security vulnerabilities in relation to application development.

  • Be the Champion of Security in a DevOps World

    Sponsored by: Veracode, Inc.

    There tends to be a gap, both technically and culturally, between what developers are doing and what security is doing, which often creates vulnerabilities. How can we close this gap without turning security into a bottleneck? Watch this webcast to learn how to incorporate security into the DevOps process.

  • A Data Privacy & Security Year in Review: Top 10 Trends and Predictions

    Sponsored by: Delphix

    Learn about the top 10 data security trends that developed throughout 2017. Plus, uncover 5 predictions about the future of data privacy and learn about a platform that integrates data masking and delivery to simplify security.

  • Payer's Place in the Healthcare Ecosystem Keys to Success

    Sponsored by: HealthEdge

    Learn how payers, providers and consumers can collaborate effectively, and about the transformation from fee for service to paying for value.

  • Real- World Examples: ROI- Results

    Sponsored by: HealthEdge

    Hear real-world examples of how health insurance companies reduced call center representative training, increased auto-adjudication rates and more.

  • 15 Essential DNS and DNSSEC Monitoring Tests

    Sponsored by: Men and Mice

    Don't fall short on your Internet security strategy. In this webcast, you can learn how to use 15 essential DNS and DNSSEC monitoring tests to help your organization detect concerns before your network performance is impacted.

  • The SIEM Essentials to Creating Your Own Security Posture

    Sponsored by: Splunk

    Watch this webcast to learn how one of the United States' biggest nuclear research firms puts SIEM software to work as part of their security posture. Go inside to learn how, by implementing SIEM, you too can get customizable incident reporting, real time account activity dashboards, and more.

  • How to Quickly Advance Your Security Posture

    Sponsored by: Splunk

    In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.

  • Data Wars: A New Hope for IT & Security Insights

    Sponsored by: Splunk

    In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.

  • Analytical Stories: How I Learned to Stop Worrying and Respond to Threats

    Sponsored by: Splunk

    This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.

  • A Day in the Life of a GDPR Breach

    Sponsored by: Splunk

    This webcast outlines what the GDPR entails, as well as outlines a basic guide for what will happen, and what you should do to mitigate the damage done by a GDPR breach.

  • Top 5 Security Challenges Brought on by Mobile and Cloud

    Sponsored by: Entrust, Inc.

    ½ of CEOs expect their industries to be unrecognizably transformed by digital transformation, mobile and cloud. This webcast delves into the top 5 security challenges presented by the changing security perimeter, such as disruption as the new normal, network and business security imperatives, identity management evolution, and more.

  • Top 5 Security Challenges Brought on by Mobile and Cloud

    Sponsored by: Entrust, Inc.

    50% of CEOs expect their industries to be unrecognizably transformed by digital transformation. This podcast delves into how businesses are undergoing a massive digital shift due to the connected world of mobility and cloud. Uncover the top 5 security challenges organizations are facing.

  • Cloud Data Management: Enabling Hybrid IT Infrastructure

    Sponsored by: Commvault

    Moving to the cloud has its advantages, but you cannot rush the process when it comes to securely moving and managing your data. Take 1 minute to learn how intelligent hybrid IT can move your data efficiently, securely, and enable access to data when you need it.

  • Your Business Apps are Under Attack: Are you really Protected?

    Sponsored by: Alert Logic

    Only 24% of organizations have mature application security in place, according to the 2017 Cybersecurity Trends Report. Take a look at this webcast to reveal statistics regarding app security and what you can do to protect yourself from cyberattacks.

  • How to Use Endpoint Analytics to Mitigate Ransomware Damage

    Sponsored by: Splunk

    Watch this tutorial on how you can prevent and mitigate the effects of advanced malware like ransomware. See how endpoint analytics can detect anomalies hidden in command scripts, and stop ransomware attacks at their source.

  • The Future of Keeping your Organization Safe

    Sponsored by: ServiceNow

    In this webcast, listen to Joseph Blankenship, Senior Analyst, Forrester Research on why switching to an automated defense system is more effective at preventing a breach.

  • Moving from Vulnerability Management to Effective Vulnerability Response

    Sponsored by: ServiceNow

    Watch this webcast to uncover how Seton Hall University went from using spreadsheets for tracking vulnerability information to a new approach to vulnerability response.

  • Strengthen Your Ransomware Strategy

    Sponsored by: AdvizeX Technologies

    Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.

  • SiliconANGLE Spotlight: HyTrust

    Sponsored by: HyTrust

    Join Eric Chiu, the founder and president of HyTrust, a security, compliance and control IT infrastructure company, to learn how this enterprise was founded, what it specializes in, and why you should care.

  • Closing the Cloud Security Readiness Gap

    Sponsored by: HyTrust

    Discover why security readiness lags behind adoption in the cloud and what can be done to mitigate the vulnerability and risk that creates.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.