ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Multimedia

  • Panel Discussion: Securing the Cloud

    Sponsored by: Dell SecureWorks

    The current pandemic has had considerable impacts on business environments and cloud usage – causing security leaders to revisit their cloud security strategies. In this webinar, join a panel of Secureworks security leaders as they explore the common challenges organizations are facing in securing their cloud environments.

  • Cloud Insiders - Risk and Compliance in the Hybrid Cloud

    Sponsored by: Xtravirt

    A hybrid cloud carries a heavy risk profile that extends throughout its infrastructure. Staying updated, implementing new features & monitoring security threats are critical processes. Not to mention the constant changes in regulations to look out for. Watch this webcast to learn more about risk & compliance in hybrid clouds.

  • CipherTrust Data Discovery and Classification from Thales

    Sponsored by: Thales

    To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.

  • Enabling & Securing Digital Identities

    Sponsored by: SailPoint Technologies

    SailPoint Identity governance enables and secures todays digital identities. Their open identity platform helps organizations manage the link between users and applications during their digital transformation. View this video to learn more.

  • Business Continuity: What Have We Learned So Far?

    Sponsored by: Akamai Technologies

    Organizations have asked their employees to work remote, and they’ve done their best to scale digital transformation as a result. These changes have supported workforce productivity requirements, but they’ve also created an expanded attack surface and unforeseen complexity. Watch this webcast to learn how organizations can adapt to the new normal.

  • Phishing Factories and Economies: The Real Persistent Threat

    Sponsored by: Akamai Technologies

    A study conducted by Akamai indicates a recent uptick in Coronavirus-related phishing attacks. Pandemic aside – phishing threats continue to grow despite increasing investment into prevention methods. Watch this webinar to learn more about the evolving phishing landscape, emerging techniques, and more.

  • Combating Threats with the DDoS Defenders at Tata

    Sponsored by: TATA Communications

    In August 2019, one of Tata Communications’ customers was targeted by a 2-wave DDoS attack campaign of unprecedented scale. This video provides an overview of the tactics and methods used by the attacker and highlights how Tata’s analysts were able to identity and isolate the threat.

  • Third Party Script Application Security: Intrusion vs Detection

    Sponsored by: Akamai Technologies

    Emerging tactics among credit card skimming attacks are underlying the need to fortify security to stay ahead of these increasingly devastating campaigns. This 20-minute video provides a brief history of Magecart attacks and the rise of third-party scripts. Watch now to learn more about these threats and better understand how to mitigate them.

  • Tata Communications’ Secure Web Gateway

    Sponsored by: TATA Communications

    As applications, infrastructures and data continue to move to the cloud, ensuring users have appropriate and reliable access – regardless of location – is critical. In this short video, discover how Tata Communications’ Secure Web Gateway enables users with enhanced visibility and security.

  • Video: Latest Credential Stuffing Attack Campaigns in Asia Pacific

    Sponsored by: Akamai Technologies

    Businesses struggle to deal with the challenge of bot and botnet attacks on their networks. Because security networks are less agile, IT departments scramble when an unknown IP is detected, and by this time, it’s usually too late. Watch this webcast to learn more about credential stuffing, a type of botnet attack that is used to gain user access.

  • How to Manage Access Control with Zero Trust

    Sponsored by: AT&T Cybersecurity

    Listen in on this conversation with the AT&T Chief Security Office (CSO) on their current point of view on how to manage access control using ZT principals, including best practices.

  • Video: Decoding Magecart/Web Skimming Attacks

    Sponsored by: Akamai Technologies

    Cyberthreat actors have taken note of the increased reliance on the internet due to COVID-19. More specifically, they are eyeing the sharp growth in online transactions. They are using web skimming, a hacking technique that injects malware onto a payment page to steal the payment information. Watch this webcast to learn more.

  • The Power of our Infrastructure is the Power of your Success

    Sponsored by: TATA Communications

    In this short video, learn more about Tata Communications and their portfolio of solutions which includes managed security, mobility, IoT, network services and more.

  • Overcome Alert Fatigue with Actionable Threat Intelligence

    Sponsored by: Bitdefender

    Organizations want to defend from threats, but because of the sensory overload caused by constant alerts, IT departments are suffering from alert fatigue. Fortunately, threat intelligence can use data to alleviate this issue. Watch this webcast to learn more.

  • SailPoint Identity Now: Certification Creation

    Sponsored by: SailPoint Technologies

    Provisioning and revoking access to critical systems and data is essential to any effective identity and access governance program. This informational video provides an insider look at SailPoint’s Identity Now hub, designed to help access provisioners assign and view which users have access to which systems.

  • Increase in Remote Workers Demands a New Standard of Identity

    Sponsored by: Okta

    In this episode of the Future of Work webinar series, Eileen Jennings-Brown, Head of Technology at Wellcome Trust, discusses how her organization prepared for remote working and how her team is preparing for further disruption in the future.

  • SailPoint Identity Hub: Search, Track & Manage Access

    Sponsored by: SailPoint Technologies

    The most difficult aspect of an organization’s identity governance strategy is understanding where their vulnerabilities lie and how to focus their tactics on addressing them. This short informational video provides a demo of SailPoint’s Identity Now hub – which allows organizations to search, track and manage access.

  • Identity Governance for Workday

    Sponsored by: SailPoint Technologies

    In this short video, discover how SailPoint can help organizations integrate identity governance into their cloud-based HR solutions, like Workday, enabling them the ability to eliminate time-consuming, manual tasks related to access provisioning and ensure each user has appropriate access to the right data and apps.

  • SailPoint Identity Now: Certification Process Overview

    Sponsored by: SailPoint Technologies

    In this latest installment of SailPoint’s short, informational videos highlighting the various capabilities of their Identity Now hub – take a closer look at how the platform improves upon traditional employee access review and certification processes. Watch now for the 3-minute demo.

  • SailPoint Identity Now: Dashboard Overview

    Sponsored by: SailPoint Technologies

    In this brief, 2-minute informational video, enjoy an overview of SailPoint’s Identity Now dashboard, an identity and access management hub designed to enable quick and easy access controls of for employees. Watch now for a quick look at the key features and how it works.

  • Best Practices for Successful Transformation Journey with Automation

    Sponsored by: Red Hat

    In this round table discussion, join leaders at Andorra Telecom, Rabobank and Discovery as they share best practices and success stories regarding their digital transformation and journey towards automation.

  • The Evolution of Automation: Unite People and Opportunity for Growth

    Sponsored by: Red Hat

    To ensure the productivity and security needs of today’s organizations are being met, IT leaders are embracing the benefits of automation for unifying their people and processes. Watch this webinar for an in-depth look at the Red Hat Ansible automation platform – its key features, capabilities and success stories.

  • Modernizing SOCs with Advanced Threat Intelligence

    Sponsored by: Bitdefender

    This webinar provides a comprehensive look at the challenges, threats, and trends as they relate to today’s SOCs, and offers insight into embracing tactical, operational and strategic threat intelligence. Join Jarret Raim and Daniel Clayton, IT security leaders at Bitdefender, as they discuss the need to modernize your SOC.

  • Threat Intelligence Driven Detect and Response Operations

    Sponsored by: Bitdefender

    Cyber threat intelligence (CTI) is both a product and a process designed to equip users with actionable information regarding a threat, enabling to mitigate the impact. In this SANS webcast, join distinguished security experts as they further discuss incorporating CTI into your organizations threat detection, hunting and response program.

  • Securing Your Data Stored in OneDrive: SailPoint Demo

    Sponsored by: SailPoint Technologies

    In order to responsibly migrate to the cloud, organizations need to take deliberate steps to ensure their cloud-native data is just as secure as on-premise data. Watch this short video for a brief overview of the challenges of ensuring cloud data protection and ways to overcome them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.