ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Multimedia

  • Your Business Apps are Under Attack: Are you really Protected?

    Sponsored by: Alert Logic

    Only 24% of organizations have mature application security in place, according to the 2017 Cybersecurity Trends Report. Take a look at this webcast to reveal statistics regarding business application security and what you can do to protect yourself from cyberattacks.

  • Agile Development to Transform Your Application Testing Program

    Sponsored by: IBM

    Watch this webinar to reveal how Cisco has transformed their application testing program to make their testing secure by using IBM's technology platform.

  • As a DevOps Engineer, What Should I know about Security Tools?

    Sponsored by: CyberArk Software, Inc

    Watch this webcast to uncover what you should know about security tools and protection in order to properly secure your DevOps.

  • IT Security and the Devops Environment

    Sponsored by: CyberArk Software, Inc

    DevOps environments are unique because of the speed and scale at which they work. Watch this webcast to reveal characteristics regarding DevOps environments as well as the security aspects of DevOps.

  • IT Security and the Devops Environment

    Sponsored by: CyberArk Software, Inc

    Watch this webcast to reveal how to improve application and infrastructure security and to engage in methods of delivering security that don't interrupt the fast flow and time to delivery.

  • Proactively Protect Against Ransomware

    Sponsored by: CyberArk Software, Inc

    Watch this webcast to reveal steps your organization can proactively take to prevent and not react to the threat of ransomware.

  • Forensic State Analysis: A New Approach to Threat Hunting

    Sponsored by: Infocyte

    Watch this SANS Institute webcast to uncover strategies to reduce the dwell time of attackers and improve your threat hunting techniques.

  • Top Trends Impacting IAM

    Sponsored by: Simeio

    Watch this webcast to learn how to 'win' in cybersecurity as well as prepare for the future of identity and access management.

  • Getting Ready for the EU General Data Protection Regulation

    Sponsored by: Ivanti

    The EU General Data Protection Regulation (GDPR) set to be effective May 25th 2018, involves many new regulatory compliance initiatives that organizations must be aware of. Download this webcast for answers to critical questions around the GDPR.

  • Getting Ready for the EU General Data Protection Regulation

    Sponsored by: Ivanti

    The EU General Data Protection Regulation (GDPR) set to be effective May 25th 2018, involves many new regulatory compliance initiatives that organizations must be aware of. Download this webcast for answers to critical questions around the GDPR.

  • Managing External Identities

    Sponsored by: Simeio

    Listen to this webinar to uncover approaches to enhance your IAM security as well as customer experience.

  • How to Use Endpoint Analytics to Mitigate Ransomware Damage

    Sponsored by: Splunk

    Watch this tutorial on how you can prevent and mitigate the effects of advanced malware like ransomware. See how endpoint analytics can detect anomalies hidden in command scripts, and stop ransomware attacks at their source.

  • The Evolution from Two-Factor Authentication to Identity Assurance

    Sponsored by: RSA

    Identity is today's most consequential attack vector, with 81% of confirmed data breaches involving weak, default or stolen passwords. Learn about how organizations are moving from simple two-factor authentication to modern, mobile multi-factor authentication for better identity assurance.

  • Moving from Vulnerability Management to Effective Vulnerability Response

    Sponsored by: ServiceNow

    Watch this webcast to uncover how Seton Hall University went from using spreadsheets for tracking vulnerability information to a new approach to vulnerability response.

  • Endpoint 101: How Do Different Types of Antivirus Work?

    Sponsored by: Carbon Black

    Take a look at this quick 101 endpoint security webcast to learn more about antivirus approaches and their strategies to enhance your endpoint security.

  • What is a Non-malware Attack?

    Sponsored by: Carbon Black

    Non-malware attacks leave a small footprint making them extremely hard to spot. Check out this 101 webcast to learn more about non-malware attacks and how you can protect yourself from them.

  • Why Digital Signing and Verification is Paramount in Cross Domain Environments

    Sponsored by: OPSWAT inc

    Malware targets USB keys and 1 out of every 8 attacks comes via USB. Watch this webcast to uncover how to protect your critical networks against recent portable media threats.

  • Use AWS to Secure Your DevOps Pipeline Like a Bank

    Sponsored by: Stelligent

    From security of the source code used to trigger builds, to the insertion of strict business controls at run time, and out to the continuous inspection of the running infrastructure to ensure compliance, this webcast teaches you how to build capabilities that are enabling them to run their business faster and safer on AWS.

  • Continuous Security on AWS

    Sponsored by: Stelligent

    If you are planning to deploy resources with AWS, or if you have already started and are looking to improve the security of your DevOps environments on AWS, then watch this webinar. You will learn how to infuse security validation in your development and deployment processes for continuous security on AWS.

  • From Agile Development to DevOps to DevSecOps

    Sponsored by: Veracode, Inc.

    It seems like organizations are still being breached left and right by cyber threats. Watch this short video to learn about a security platform that will protect your application layer by providing an end-to-end platform, cloud-based scalability, and strategic support to make application security a top priority.

  • Strengthen Your Ransomware Strategy

    Sponsored by: AdvizeX Technologies

    Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.

  • Cisco Umbrella: How does it Improve Security Effectiveness?

    Sponsored by: Cisco Umbrella

    Threat detection and prevention is crucial to the security of your business. Join Steve Martino, CISO of Cisco, and his staff as they explain the value of Cisco Umbrella in improving overall security effectiveness.

  • Mobile Application Security: Discovering Leaks and Remediation

    Sponsored by: WhiteHat Security

    25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.

  • Security Product Overview: Cisco Umbrella

    Sponsored by: Cisco Umbrella

    Over 1/2 of the PCs in organizations are mobile – which means you need to protect your workforce wherever they access the internet. In this product introduction, learn about Cisco Umbrella, a cloud-delivered network security service that protects any device, anywhere.

  • SiliconANGLE Spotlight: HyTrust

    Sponsored by: HyTrust

    Join Eric Chiu, the founder and president of HyTrust, a security, compliance and control IT infrastructure company, to learn how this enterprise was founded, what it specializes in, and why you should care.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.