ComputerWeekly.com Research Library

Powered by Bitpipe.com

TLS Multimedia

  • 3 Steps to Secure Remote Workers and Students

    Sponsored by: Cisco Umbrella

    As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.

  • Addressing Enterprise Security Challenges

    Sponsored by: Rackspace

    In this webinar, you’ll hear from 2 keynote speakers. The first speaker is an AWS Specialist Solutions Architect who provides an in-depth analysis of the most pressing cybersecurity challenges for enterprises. The second speaker, an Principal Architect at Rackspace, takes over to discuss achieving operational efficiency in cloud environments.

  • An Overview of Barracuda PhishLine

    Sponsored by: Barracuda

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

  • Auth0 Platform Introduction

    Sponsored by: Auth0

    This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.

  • Azure Essentials: Defense in depth security

    Sponsored by: TechData - Microsoft

    As cloud becomes more widely adopted, security across these expanding cloud environments needs to improve to keep pace with modern threats and operational requirements. Watch this video to learn more about Microsoft Azure’s cloud security, management and control capabilities, including how it leverages machine learning.

  • Barracuda Forensics and Incident Response

    Sponsored by: Barracuda

    When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.

  • Barracuda Lightboard: Total Email Protection

    Sponsored by: Barracuda

    This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.

  • Best Practices for Successful Transformation Journey with Automation

    Sponsored by: Red Hat

    In this round table discussion, join leaders at Andorra Telecom, Rabobank and Discovery as they share best practices and success stories regarding their digital transformation and journey towards automation.

  • Beyond the Headlines: How is the Pandemic Really Changing Cyberattacks?

    Sponsored by: CI Security

    The spread of the Coronavirus has affected nearly every aspect of our lives, so it should come as no surprise that cyberattackers are taking full advantage. In this webinar, leverage the expertise of an industry expert as they highlight vulnerable areas hackers target most often and offer best practices for mitigating these threats.

  • CipherTrust Data Discovery and Classification from Thales

    Sponsored by: Thales

    To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.

  • Cloud Insiders - Risk and Compliance in the Hybrid Cloud

    Sponsored by: Xtravirt

    A hybrid cloud carries a heavy risk profile that extends throughout its infrastructure. Staying updated, implementing new features & monitoring security threats are critical processes. Not to mention the constant changes in regulations to look out for. Watch this webcast to learn more about risk & compliance in hybrid clouds.

  • Cloud Native Security

    Sponsored by: Rackspace

    The global shift towards cloud tools and capabilities has completely changed the cybersecurity landscape. Now more than ever, organizations need to re-evaluate their cloud security strategy to reflect today’s challenges. In this webcast, join security experts at Rackspace and AWS as they discuss these challenges and explore how to address them.

  • Cloud Security Guardian Integration with Microsoft Azure 2019

    Sponsored by: Barracuda

    Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.

  • Connect, Enable and Protect Your Workforce

    Sponsored by: IBM

    Although the massive shift towards remote work seemed like a temporary protocol at first, this new way of working looks to be the norm for the foreseeable future. Luckily, securing a remote workforce doesn’t require a massive restructure. Watch this webinar to see how IBM is helping organizations embrace the new normal.

  • Creating Digital Trust: Anchoring Remote Users to Real Identities

    Sponsored by: Onfido

    As a result of recent data breaches and modern technology advances, users are demanding a seamless experience that doesn’t skimp on security either. So, how can organizations establish trust and achieve identity verification through digital mediums? Watch this video to find out.

  • Credential Stuffing 2020: Attack Tools and Trends

    Sponsored by: F5 Networks

    Recently emerging as one of the most prominent threats targeting web applications, credential stuffing has found its way into news headlines and mainstream media. This webinar provides an overview of the current credential stuffing trends and tactics – highlighting how the threat has evolved over the years.

  • Doing DevSecOps Right: Implementation & the Metrics that Matter

    Sponsored by: Capsule8

    DevSecOps is a crucial part of an emerging security and IT strategy, one which realizes that security has to be implemented early, often, and in a more flexible manner. But how can your company adopt these practices, and then measure their effectiveness? Watch this Capsule8 video to learn some effective DevSecOps principles and metrics.

  • Email Protection with Asaf Cidon

    Sponsored by: Barracuda

    Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.

  • Endpoint Detection and Response

    Sponsored by: Claranet

    In this 6-minute webinar, tune into a discussion about the evolution of endpoint detection and response (EDR) – from niche monitoring tool to a staple for overworked IT and security teams.

  • Equifax and the 147 Million: One Individual’s Story from behind the Headlines

    Sponsored by: Auth0

    What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.

  • Evolution of Email Security

    Sponsored by: Barracuda

    Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.

  • Faster Threat Detection and Response with Data Science and Next-gen SIEM

    Sponsored by: Cysiv

    Given the implications of a successful cyberattack, the need for effective threat detection and response has never been more urgent. In this short webinar, the Chief Technical Officer at Cysiv provides an overview of how threat detection and SIEM objectives can benefit from the use of data science. Watch now to learn more.

  • Automated Compliance: Making the Case and Reaping the Rewards

    Sponsored by: Tripwire, Inc.

    Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.

  • Dirk Hohndel on Intel and the Linux Foundation

    Sponsored by: Intel

    In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.

  • Enterprise Security Checklist

    Sponsored by: Code42

    This 6-item checklist provides key recommendations to help boost security against today's cybercrime.

Browse by Report Type: TLS White Papers | TLS Multimedia | TLS IT Downloads

See more topics related to: TLS

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.