ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Multimedia

  • Navigating The Unpredictability Of It Security, With Stuart Mcirvine

    Sponsored by: BROADCOM, Inc

    Tune into this episode of the Conversations with Dez podcast to join Broadcom Director of Product Management Stuart McIrvine as they discuss the ever-evolving cybersecurity landscape, the role of mainframe security in the larger cybersecurity picture, Broadcom’s efforts to make the world a safer place, and more.

  • CPP Associates Security Practice

    Sponsored by: CPP Associates

    Like any sect of criminal, cybercriminals thrive in times of crisis – such as the COVID-19 pandemic that impacted nearly everyone. This short video highlights some of the changes in the threat landscape and overviews the key functions and capabilities of CPP Associates’ security offerings.

  • _beta access: General Use Cases

    Sponsored by: Beta Systems

    In this short video, take a closer look at some of the common challenges organizations face when using Resource Access Control Facility (RACF) and discover how Beta Systems can help to address these pain points – watch now to get started.

  • Thales Video

    Sponsored by: Beta Systems

    It’s a common misconception that cyberattacks originate from external hackers. However, it’s been found that inside perpetrators – usually current or former employees – present a serious risk. Watch this video to learn more about Beta Systems IAM and how it’s enabling organizations to protect sensitive data and prevent internal threats.

  • What your cloud security provider might be missing

    Sponsored by: Cisco

    Securing today’s dynamic networks is more difficult than ever, especially in the era of cloud apps, environments and devices. View this session to unlock the 4 key components of a robust, forward-thinking cloud strategy.

  • A First-of-Its-Kind Secure SD-WAN Solution for Multi-Cloud Application Deployments

    Sponsored by: Fortinet, Inc.

    As more and more organizations opt for cloud, hybrid cloud and multi-cloud environments, it becomes increasingly critical to ensure that security is at the core of each initiative. Access this webinar to learn how to increase visibility and control over your cloud environment by designing a secure SD-WAN tool.

  • Podcast: Security experts discuss mainframe security

    Sponsored by: BROADCOM, Inc

    In this podcast episode, join Broadcom’s Chip Mason and Mary Ann Furno as they discuss the latest news, trends, insights and solutions around mainframe security, education, DevSecOps, and more – listen in to get started

  • Ransomware Attacks on The Rise Again

    Sponsored by: Fortinet, Inc.

    Ransomware attacks have become one of the most disruptive cyberthreats facing organizations in 2021. This webinar highlights real-world observations and offers strategic recommendations to help you better understand and prepare for ransomware attacks – watch now to get started.

  • Ransomware Threat Spotlight

    Sponsored by: Barracuda

    Another unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.

  • Protecting Business and Remote Workers from Covid-19 Email Threats

    Sponsored by: Barracuda

    The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.

  • Travelex, UK retail in 2019, and royal departures

    Sponsored by: ComputerWeekly.com

    In this week's episode of the Computer Weekly Downtime Upload podcast, Caroline Donnelly, Clare McDonald and Brian McKenna talk about the Travelex ransomware attack, the retail sector's poor performance in 2019, and Harry and Meghan's Instagram-powered separation from the Windsors.

  • Webinar: 20 Critical Controls for Cyber Defense

    Sponsored by: ISACA

    Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.

  • Webinar: Protecting Critical SaaS Data Before It’s Too Late

    Sponsored by: Spanning Cloud Apps

    This webinar goes through the best practices for SaaS data protection. Presented by industry experts, it touches on the key points for understanding how to ensure SaaS data protection and how to find the right provider.

  • Web Security – Virtual Appliance

    Sponsored by: Cisco Systems, Inc.

    Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.

  • Rabobank International Enabling Customers to Bank Safe With HP

    Sponsored by: Hewlett-Packard Enterprise

    View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.

  • KPN focuses on Information Security with HP

    Sponsored by: Hewlett-Packard Enterprise

    View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.

  • HID Global's ActivID® Authentication: Online Banking

    Sponsored by: HID Global

    This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.

  • 2013 Cost of Cyber Crime – UK, France and Germany Findings

    Sponsored by: Hewlett-Packard Enterprise

    Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.

  • Reducing Security Complexity

    Sponsored by: Optus Business

    In this webcast, you will be provided with a high level overview of the emerging threats within the Australian security landscape and how these affect midsized organisations.

  • The New Status Quo: Zero-Day and Targeted APT Attacks

    Sponsored by: FireEye

    During the webcast, Dr. Wang of Forrester Research and Ashar Aziz of FireEye will provide insight on data breach incidents and how to protect your company from cybercrime.

  • Protecting Your Multi-Platform Network: The New Wave of Attacks

    Sponsored by: ESET

    Join us to examine some of the malware risks associated with heterogeneous computing environments and solutions to protect your valuable business assets.

  • Death and Taxes...and Hackers

    Sponsored by: Imperva

    View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.

  • The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape

    Sponsored by: ESET

    In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 

  • How Application Whitelisting Can Increase Your Desktop Security

    Sponsored by: Faronics

    In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus.

  • Cascading Risk

    Sponsored by: Core Security Technologies

    This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.