ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Multimedia

  • How Okta’s IT + Workplace Teams Are Getting Ready for Dynamic Work

    Sponsored by: Okta

    While the trends and practices within workplace optimization have varied over the last few decades, the main objective has remained the same: Optimize the productivity of people and processes. Watch this webinar and listen to 2 distinguished Okta leaders as they discuss the future of workplace optimization.

  • Hot Topic Live Okta Guy Mason

    Sponsored by: Okta

    In this episode of Hot Topics Live, join the CIO of Bourne Leisure, a major player in the UK holiday and hospitality industry, as they discuss how the organization dealt with the pandemic and its ensuing lockdown.

  • Shor's Algorithm

    Sponsored by: Thales

    While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.

  • Securing the New Normal: A Virtual Happy Hour on Moving Forward

    Sponsored by: RSA Conference

    In this webcast, a panel of industry leaders discuss the future of cybersecurity, highlighting what’s next for the industry, and the ways in which cybersecurity will evolve as we come to understand the “new normal” – focusing on business processes, procedures and policies, network security architecture and much more.

  • From 30% to 100% Remote: How to Lead the Rapid Shift to a Remote Workforce

    Sponsored by: Okta

    Connecting and communicating is critical for maintaining a semblance of normality, especially during times of crisis. Achieving this in the era of COVID-19, which saw the remote workforce jump from 30% to 100%, has been particularly challenging. Watch this webinar to see how IT and workplace technology experts at Okta handled this transition.

  • Okta Inner Circle Conversations: How Selfies are Helping Secure the Insurance Sector

    Sponsored by: Okta

    In this webinar, uncover how Okta partners with Jumio to use facial recognition selfie-based authentication to replace knowledge-based authentication.

  • The 5 Most Dangerous New Attack Techniques and How to Counter Them

    Sponsored by: RSA Conference

    What are the most dangerous new techniques attackers are employing? This fast-paced briefing features three experts from the SANS Institute best-positioned to provide answers: the nation’s top expert on mobile forensics, the director of the Internet Storm Center and the top hacker exploits expert in the US.

  • Eileen Jennings-Brown Podcast

    Sponsored by: Okta

    Tune into “The Future of Work” with Eileen Jennings-Brown, Wellcome Trust’s Head of Technology, to learn how Jennings-Brown is preparing her team for the future of remote working.

  • What SMBs Need to Know to Survive a Ransomware Attack

    Sponsored by: RSA Conference

    Ransomware is costly and can be catastrophic for businesses—but it doesn’t have to be. This webcast focuses on the cybersecurity needs of small to medium-sized businesses. Industry leaders walk you through the steps you can take (regardless of your budget) to ensure that your business survives a ransomware attack.

  • How Threat Modeling & Attack Simulation Works

    Sponsored by: Coalfire

    In this webinar, join Mike Weber, VP of Innovation at Coalfire, as he overviews how threat modeling and cyberattack simulations work within security program architectures – including how to interpret simulation data. Watch now to learn more about identifying and understanding the risks within your environment.

  • The Future of Work: Okta Podcast

    Sponsored by: Okta

    Listen to the first episode of The Future of Work Series, in partnership with Okta, with Guy Mason, Bourne Leisure Group’s CIO, in conversation with Editor Peter Stojanovic as they discuss how to adjust to a remote work lifestyle.

  • How malware authors make attack detection simple yet complex

    Sponsored by: Cisco Umbrella

    Emerging malware techniques indicate that cybercriminals are favoring simple, yet complex tricks in order to successfully conduct their campaigns. Watch this video to learn more about trending threat patterns, new malware tricks and how the simplest techniques can help organizations overcome these challenges.

  • BlackBerry AI Powered Zero Trust

    Sponsored by: BlackBerry

    Endpoint security affects all aspects of an organization, not least when workforces are remote.To this end, Zero Trust can be a double-edged sword for leaders in industry. Namely, they want to stock up on security without sacrificing user experience. How can this be done in a mature manner?This webcast presents models that organizations can use.

  • Hot Topic Live: Eileen Jennings-Brown

    Sponsored by: Okta

    COVID-19 has been a pivotal event in reshaping not just where we work, how we work or who we work with, but what works. In this Future of Work episode, Eileen Jennings-Brown discusses how her organization, Wellcome Trust, prepared for remote working and how her team is preparing for further disruption in the future.

  • Auth0 Platform Introduction

    Sponsored by: Auth0

    This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.

  • How to Implement Zero Trust Security in Europe

    Sponsored by: Okta

    Zero Trust has come a long way since its inception in 2009, but many still have questions. What should Zero Trust look like? How does it affect workloads, networks, people and devices within an organization? How can I begin to implement my own Zero-Trust model? Watch this webcast for answers to these questions and more from Forrester & Okta.

  • A Deeper Look Into the Threat of Botnets

    Sponsored by: Cisco Umbrella

    Tune into this Cisco Umbrella webinar to learn about how recent botnets infect, proliferate and distribute malware, and how you can keep your users safe from malware distributed by botnets.

  • Cisco Umbrella SASE

    Sponsored by: Cisco Umbrella

    In this webinar, learn about Cisco Umbrella, a single, simple to manage cloud service, sometimes referred to as a Secure Access Service Edge or SASE solution. It can stop threats before they strike with DNS-layer security.

  • Threat Landscape Across Benelux and DNS as First Line of Defense Against Threats

    Sponsored by: Cisco Umbrella

    Tune into this webinar to uncover the types of cyberattacks across the Benelux region and how Cisco Umbrella can help mitigate them.

  • Inspecting a Phishing Campaign using Cisco Talos

    Sponsored by: Cisco Umbrella

    Join this video demo as security experts look into a phishing campaign that was set up to phish users’ credentials by leveraging interest in the global pandemic.

  • Data Security: Best Practices for Remote Workers

    Sponsored by: TITUS

    How do you tackle the issues associated with securing remote workers (such as easily compromised home Wi-Fi networks)? Tune into this webcast to hear experts walk you through best practices for securing your remote workforce and endpoints in today’s distributed enterprises.

  • Barracuda Lightboard: CloudGen Firewall

    Sponsored by: Barracuda

    In this short video, learn about Barracuda CloudGen Firewall, a family of physical, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure.

  • Secure Remote Access Readiness: Webinar

    Sponsored by: Pulse Secure

    Unplanned remote working can dramatically increase threat exposure, cyberattacks and data leakage risks. That means your organization needs to be prepared in the event of a global crisis. Learn how Pulse Secure enables business continuity and productivity with their secure remote access solution.

  • ITProTV | Microsoft AZ 500: Create, Configure, Network, App Security Groups

    Sponsored by: Cornerstone OnDemand

    In this video, learn what Network Security Groups and Application Security Groups are, and explore the 7 steps required to filter network traffic with a network security group using the Azure Portal.

  • Secure Remote Access Readiness: Podcast

    Sponsored by: Pulse Secure

    Unplanned remote working can dramatically increase threat exposure, cyberattacks and data leakage risks. That means your organization needs to be prepared in the event of a global crisis. Learn how Pulse Secure enables business continuity and productivity with their secure remote access solution.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.