ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Multimedia

  • Video: IT Priorities 2023 APAC

    Sponsored by: TechTarget ComputerWeekly.com

    Over half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.

  • SIG - SASE in 15 minutes

    Sponsored by: Cisco

    Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.

  • Ransomware Threat Spotlight

    Sponsored by: Barracuda

    Another unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.

  • Backup: A Critical Security Tool as you Transition to a Fully Remote Workforce

    Sponsored by: Barracuda

    In this webinar presented by Stasia Hurley, Senior Product Marketing Manager for data protection at Barracuda, see why making sure your backup strategy up to date is especially important during the COVID-19-caused transition.

  • Scaling and Protecting Websites stretched by COVID-19

    Sponsored by: Barracuda

    The COVID-19 crisis is forcing organizations to dramatically accelerate the shift to doing business online. This means you’re suddenly ramping up the web applications that your business depends on. Join this webinar to get advice on how to stay secure while rapidly scaling up capacity.

  • Securing Your Business During the COVID-19 Crisis

    Sponsored by: Barracuda

    Like you, Barracuda is adjusting to having everybody working from home. That’s why they’ve created a new webinar that shares insights about the key security challenges that this change entails, and how to overcome them. View now to gain actionable insights about how to keep your business secure in this extraordinary time.

  • Protecting Business and Remote Workers from Covid-19 Email Threats

    Sponsored by: Barracuda

    The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.

  • Extending Secure Access to Remote Workers

    Sponsored by: Barracuda

    These are extraordinary times, and the sudden shift to a very widespread remote-work model is creating security and network-administration challenges that you may never have faced before. Join this webinar to find out how you can ensure secure and reliable access to online resources for all your users.

  • CASE STUDY: Tricentis slams the door on C-level email attacks using Barracuda Sentinel

    Sponsored by: Barracuda

    Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.

  • IT Priorities 2018 - What's happening in security?

    Sponsored by: TechTarget ComputerWeekly.com

    In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.

  • Unlocking the Value of Data, Securely with AWS and Privitar

    Sponsored by: Privitar, AWS

    This webinar explains the importance of modern data security compared with the traditional data security system. Tune in to learn how you can elevate your security with the AWS Cloud.

  • Cloud Security: Enterprise Point of View

    Sponsored by: Dimension Data

    Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.

  • Overcoming the Challenges of Internal API Programs

    Sponsored by: Intel® Services

    Modernizing legacy applications can be handled gracefully when the right API system is considered from the very beginning. View this webcast now to find out how to overcome cultural obstacles in implementing an internal API program, and how to present the value of having such a program.

  • Security Operations Center (SOC) Essentials for the SME

    Sponsored by: AT&T Cybersecurity

    Watch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.

  • Enterprise Security and your Technology

    Sponsored by: Hewlett Packard Enterprise

    This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.

  • Webinar: 20 Critical Controls for Cyber Defense

    Sponsored by: ISACA

    Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.

  • Tips for Expediting Incident Response

    Sponsored by: Threat Track Security

    This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.

  • Symantec Endpoint Protection 12 Trialware

    Sponsored by: Symantec Corporation

    Access this trial software by Symantec and discover the benefits of effective endpoint security.

  • Take Control of Critical Information for Your Employees' Sake

    Sponsored by: Clearswift

    This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.

  • Webcast: Symantec Internet Security Threat Report 2014

    Sponsored by: Symantec Corporation

    Download and tune in to this exclusive webcast to get the Internet Security Threat Report for 2014. Get the intel you need to strengthen and defend your systems against breaches, malware, and targeted attack campaigns.

  • Balancing Risk with Agility: Best Practices for Securing Cloud Deployments

    Sponsored by: Trend Micro

    Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.

  • Keep Endpoint Data Safe

    Sponsored by: Code42

    This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.

  • From SIEM to Security Analytics: The Path Forward

    Sponsored by: EMC Corporation

    Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.

  • Maximum-Strength Threat Detection for Mid-Size Enterprises

    Sponsored by: EMC Corporation

    This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.

  • Navigating Security in a Mobile World

    Sponsored by: Cisco Systems, Inc.

    This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.