ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Multimedia

  • Equifax and the 147 Million: One Individual’s Story from behind the Headlines

    Sponsored by: Auth0

    What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.

  • Punycode: Awareness and Protection

    Sponsored by: Cisco Umbrella

    The topic of this episode of A Cybersecurity Technical Mini Series: Punycode. But what is Punycode, how does it work & why is it important? To find out, join Chris Riviere, a security expert at Cisco as he further explores this malicious domain tactic.

  • Cloud Native Security

    Sponsored by: Rackspace

    The global shift towards cloud tools and capabilities has completely changed the cybersecurity landscape. Now more than ever, organizations need to re-evaluate their cloud security strategy to reflect today’s challenges. In this webcast, join security experts at Rackspace and AWS as they discuss these challenges and explore how to address them.

  • Okta ASA Netskope Private Access demo

    Sponsored by: Okta + Netspoke

    In this video demo, join a Solutions Architect at Okta as they provide a quick walkthrough of how Okta Advanced Server Access & Netskope Private Access can work together to enhance user experience.

  • The Big Easy - 3 steps for better security

    Sponsored by: Cisco Umbrella

    In this video, take a look at the 3 most common threat vectors, and discover best-practices for detecting, isolating and mitigating these threats before they have a chance to strike.

  • Synack CISO Podcast Series: Action in Unprecedented Times

    Sponsored by: Synack

    In this episode of the Synack CISO Podcast Series, the hosts are joined by Mike Newborn, CISO at Navy Federal Credit Union, as they discuss ensuring the safety and productivity of employees during these trying times, as well as building customer trust and the increase in malicious activity. Listen to the podcast to learn more.

  • Webinar: "I Love Agent-Based Security!" Said No One, Ever.

    Sponsored by: Orca Security

    As organizations continue to rely on cloud assets and environments, the efficacy of agent-based security wanes. In this webinar, join a panel of CSOs as they break down their budget and best practices for securing their environments, discuss the hidden risks plaguing your network, and more. Watch now to get started.

  • Backup - Cyber Security's Last Line of Defense

    Sponsored by: Cobalt Iron

    Access this webcast to hear from Doug Chando, Solutions Architect at Cobalt Iron, and Jason Cray, CI and Storage Architect at Sirius, who discuss the role of data protection in cyber security, why backup is your last line of defense, how a secure backup environment should look, and more.

  • What Is Intrinsic Security?

    Sponsored by: VMware International Unlimited Company

    In this video, join Tom Corn, Senior Vice President of security products at VMware as he defines the concept of intrinsic security and outlines the value it can bring to your security efforts as well as business operations as a whole.

  • Industry and Financial Regulations: The Implications for Application Security

    Sponsored by: Veracode, Inc.

    Today’s financial institutions face stringent regulations to ensure the responsible management and protection of sensitive user data. In this webinar, join Chris Wysopal, CTO and co-founder of Veracode, as they navigate the security and compliance implications of building and maintaining a mobile financial application.

  • 3 Steps to Secure Remote Workers and Students

    Sponsored by: Cisco Umbrella

    As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.

  • E-commerce has been revolutionized in the last decade

    Sponsored by: The Media Trust

    Most brands don’t control or manage 65-95% of the code that defines the digital shopping experience. While this code enables critical features, it exposes organizations to potential security risks. In this webinar, take a closer look at third-party risk areas and discover how to address these challenges.

  • Evolution of Email Security

    Sponsored by: Barracuda

    Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.

  • Virtual Cloud Security Summit: Securing Your Network from the Cloud

    Sponsored by: Cisco Umbrella

    With organizations continuing to embrace cloud migration, a shift in security is also necessary to maintain the protection of cloud-native workloads. In this video, discover how Cisco Umbrella unifies security capabilities for cloud users to ensure safe adoption and access. Watch now to get started.

  • Intruder Alert: Secure Your Remote Access Tools from Cyberattacks

    Sponsored by: ConnectWise

    Like any other business, MSPs and other service providers are not immune from the threats posed by cyberattacks and ransomware – and often, have much more to lose. Tune into this webinar to hear security industry experts discuss seven security precautions that every MSP should be considering

  • Passwordless Authentication Solutions by Thales

    Sponsored by: Thales

    Passwords are the weak link to cybersecurity, being at the root cause of more than 80% of today’s data breaches. This brief video highlights the features and capabilities of SafeNet Trusted Access, Thales’ designed to provide access management that looks beyond the need for passwords. Watch now to learn more.

  • NetOps 2.0: Application Intelligence

    Sponsored by: Gigamon

    Overnight millions are suddenly working from home, putting IT teams under tremendous pressure to maintain security and performance in spite of an increased load. But there are effective ways to respond. In this webinar, review these new challenges and learn how NetOps 2.0 gives you the agility to adapt and win.

  • How to Ensure Security and Productivity When Working from Home on Zoom

    Sponsored by: Morphisec, Inc.

    In this webinar, explore some of the key challenges organizations are facing when it comes to ensuring the protection and productivity of their remote workforce, and discover best practices being implemented to overcome these issues.

  • Barracuda Forensics and Incident Response

    Sponsored by: Barracuda

    When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.

  • Skybox Security Overview

    Sponsored by: Skybox Security

    This short video highlights the key capabilities of the Skybox Security Suite, which offers functionalities that range from vulnerability and threat management to firewall and security policy management. Learn more about the suite now, and see if it’s a good fit for your needs.

  • How the CLOUD Act affects you

    Sponsored by: IONOS

    Regulations can always change, so you need to plan accordingly and future-proof your infrastructure. Watch this webinar to learn more about the US CLOUD Act, how it affects your customers, and what you can do about it with regards to staying GDPR-compliant.

  • Protecting Business and Remote Workers from COVID-19 Email Threats

    Sponsored by: Barracuda

    The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.

  • Beyond the Headlines: How is the Pandemic Really Changing Cyberattacks?

    Sponsored by: CI Security

    The spread of the Coronavirus has affected nearly every aspect of our lives, so it should come as no surprise that cyberattackers are taking full advantage. In this webinar, leverage the expertise of an industry expert as they highlight vulnerable areas hackers target most often and offer best practices for mitigating these threats.

  • WEBINAR: Protecting Against Coronavirus Email Fraud

    Sponsored by: Armorblox

    Socially engineered attacks are always aligned with what people are talking (or worried) about. So, it should come as no surprise that record amounts of cyberattacks have been using the current Coronavirus pandemic as a lure to cause disruptions. Watch this webinar to learn more about their tactics and how to spot them.

  • Webinar: The TCO of Automated, Cloud-Native Patch Management

    Sponsored by: Automox

    Most enterprises currently employ an on-premises patch management solution for addressing key risk areas. However, like most modern business tools, going cloud-native can decrease overhead while improving agility and scale. Watch this webinar to learn how to improve your patch management by going cloud-native.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.