ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Multimedia

  • Digital Transformation At The Enterprise Edge

    Sponsored by: CradlePoint

    Required capacity to connect is at an all-time high. Network security must be threat-ready, WANs must deliver performance and edge-to-cloud latency must be as low as possible. Is your network prepared? Watch this webcast for a deeper view of enterprise digital transformation and the technologies that are taking the lead.

  • Business Continuity: What Have We Learned So Far?

    Sponsored by: Akamai Technologies

    Organizations have asked their employees to work remote, and they’ve done their best to scale digital transformation as a result. These changes have supported workforce productivity requirements, but they’ve also created an expanded attack surface and unforeseen complexity. Watch this webcast to learn how organizations can adapt to the new normal.

  • Webinar - Defend Better and Respond Faster With Security That Works Together

    Sponsored by: Cisco Umbrella

    Most malware infections happen in one of only 3 ways, so why aren’t they easier to stop? As organizations embrace the cloud, it’s now imperative to find a new approach to securing users and devices. View this webinar to find out how to stop attacks before they start and how to safeguard your organization with a layered approach to cybersecurity.

  • Third Party Script Application Security: Intrusion vs Detection

    Sponsored by: Akamai Technologies

    Emerging tactics among credit card skimming attacks are underlying the need to fortify security to stay ahead of these increasingly devastating campaigns. This 20-minute video provides a brief history of Magecart attacks and the rise of third-party scripts. Watch now to learn more about these threats and better understand how to mitigate them.

  • Webinar - SASE Convergence of Cloud Security and Networking

    Sponsored by: Cisco Umbrella

    It’s the new normal, and ensuring security for this cloud-centered reality is paramount. Businesses must deepen visibility, protection and control of internet traffic while simplifying security deployment and management. Watch this webinar to learn how Cisco is breaking new ground with a SASE as well as unified SD-WAN and cloud security offers.

  • Tata Communications’ Secure Web Gateway

    Sponsored by: TATA Communications

    As applications, infrastructures and data continue to move to the cloud, ensuring users have appropriate and reliable access – regardless of location – is critical. In this short video, discover how Tata Communications’ Secure Web Gateway enables users with enhanced visibility and security.

  • Simple, Secure Networking with SD-WAN

    Sponsored by: Verizon

    Digital transformation has changed from a ‘down-the-road’ initiative to an action item. With the changing application landscape and increase in cloud connectivity, organizations need to become more adaptable – and fast. View this webcast on how SD-WAN can galvanize transformation by amplifying network performance and security.

  • Red Hat and Synopsis Podcast

    Sponsored by: Red Hat Synopsys

    Learn how to safeguard against poor security at every level and layer of your cloud-native environment in this podcast, which features insight from TechTarget, Red Hat, and Synopsis experts.

  • OpenShift Container Adoption Webinar Series: Security

    Sponsored by: Red Hat Synopsys

    The most common misconception for container security is that, since your applications are in containers, they are secure. In reality, applications are your biggest attack surface—and that risk is present in every single layer of the stack. Learn more about debunking container security myths in this resource.

  • Real World SD-WAN from MTM Technologies + CISCO (NYC Story)

    Sponsored by: MTM Technologies

    If you’re part of an organization with a goal of digitally transforming their network architecture, capabilities and security, then it may be worth educating yourself on the paradigm-shifting SD-WAN.In this video, learn how a company with global design, manufacturing and retail locations was able to optimize their network operations with SD-WAN.

  • Webinar: Application Fluency through Automated SD-WAN

    Sponsored by: Oracle Communications

    How can software-defined networking optimize network architecture to enhance application performance? This Doyle Research webcast, presented by Oracle, gives an overview of SD-WAN and how it helps you get the most out of your mission-critical apps.

  • The 5 Most Dangerous New Attack Techniques and How to Counter Them

    Sponsored by: RSA Conference

    What are the most dangerous new techniques attackers are employing? This fast-paced briefing features three experts from the SANS Institute best-positioned to provide answers: the nation’s top expert on mobile forensics, the director of the Internet Storm Center and the top hacker exploits expert in the US.

  • Auth0 Platform Introduction

    Sponsored by: Auth0

    This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.

  • ITProTV | CompTIA PenTest+: Analyze Scripts: Python

    Sponsored by: Cornerstone OnDemand

    This video will walk you through how to analyze Python scripts for the CompTIA PenTest+: and will explain the foundational knowledge of Python so that you are better equipped to write scripts and analyze and discern the purpose of scripts you come into contact with. Tune in to start your test prep.

  • ITProTV | Microsoft AZ 500: Create, Configure, Network, App Security Groups

    Sponsored by: Cornerstone OnDemand

    In this video, learn what Network Security Groups and Application Security Groups are, and explore the 7 steps required to filter network traffic with a network security group using the Azure Portal.

  • Cequence Security: API Sentinel Podcast

    Sponsored by: Cequence

    Tune into this podcast from Cequence Security to learn how API Sentinel can help you identify all your APIs, uncover security risks and address them to eliminate potential fraud or data loss.

  • Scaling and Protecting Websites stretched by COVID-19

    Sponsored by: Barracuda

    The COVID-19 crisis is forcing organizations to dramatically accelerate the shift to doing business online. This means you’re suddenly ramping up the web applications that your business depends on. Join this webinar to get advice on how to stay secure while rapidly scaling up capacity.

  • Continuous Application Security: A Unified Approach Across the SDLC

    Sponsored by: Contrast Security

    This webinar makes the case for instrumentation-based unified application security. With IAST and RASP, the security strategy can detect vulnerabilities, prevent exploits, secure data, and maintain compliance. Watch the webinar now to find out more.

  • Security Instrumentation is the Future of All Software

    Sponsored by: Contrast Security

    We’re in a software security crisis—and we have been for a while now. In both 2000 and 2019, applications had an average of 26.7 serious vulnerabilities. This webinar examines the state of application security and considers how strong instrumentation-based application security platforms are key to finally uniting development and security.

  • Security Process Overview of the Neptune DX Platform

    Sponsored by: Neptune Software

    The Neptune DX platform offers its users a variety of speedy low-code development options. But how does it ensure that your systems remain safe? Watch this short video to learn how the security features of Neptune DX work, and learn the three different levels they use to manage security.

  • Rethinking API Security

    Sponsored by: Okta

    APIs enable organizations with new avenues for enhancing business operations and customer experiences. In this session, we’ll cover the foundations of developing, securing, and managing access to the critical APIs that drive our business.

  • Implementing Privacy Policy: Application Security the Easy Way

    Sponsored by: Ionic Security

    The fundamental issue with data protection is that security is often siloed, but sensitive data isn’t, leaving apps and data at risk. This webcast takes a closer look at Ionic Machina, which focuses on data protection through scalability, visibility, and access management controls. Watch now to learn more.

  • Unbreakable API: Best Practices for AppSec Testing

    Sponsored by: WhiteHat Security

    Modern API development is creating more and more entry points in an application’s architecture for cyberattacks. In this WhiteHat webinar, chief scientist Eric Sheridan goes through some best practices for APIs, including industry perspectives, AppSec breakdowns, and more. Get up to date with your API security strategy. Watch the webinar now.

  • Is the Cloud Transforming Security?

    Sponsored by: Menlo Security

    As IT teams continue to prioritize cloud transformation, it’s imperative to also reconsider security tactics in order to realize the full benefits of cloud services.In this webinar, leverage industry expertise around cloud transformation, security implications, and explore the benefits of isolation tactics.

  • Establish Secure DevOps Practices

    Sponsored by: Centrify Corporation

    The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development. However, security can be an afterthought when adopting these. In this webcast, explore DevSecOps and how it can help your organization take the "fast lane" through security into production.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.