ComputerWeekly.com Research Library

Powered by Bitpipe.com

WS-Security Multimedia

  • 3 Steps to Secure Remote Workers and Students

    Sponsored by: Cisco Umbrella

    As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.

  • 7 Key Steps to Developing an Audit-Ready Security Program

    Sponsored by: Ostendio

    In this webinar, join the President and CEO of Ostendio as he provides a comprehensive overview of the 7 steps to developing an audit-ready security program, including key considerations for ensuring organization-wide buy-in. Watch now to get started.

  • An Overview of Barracuda PhishLine

    Sponsored by: Barracuda

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

  • Artificial Intelligence in Cybersecurity

    Sponsored by: Spin Tech

    Given the nature of artificial intelligence, it’s no surprise to see organizations integrating AI capabilities into their cybersecurity strategies. This webinar provides a comprehensive overview of AI and its role in cybersecurity, offering expertise for evaluating AI-based cybersecurity tools and vendors.

  • Auth0 Platform Introduction

    Sponsored by: Auth0

    This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.

  • Barracuda Forensics and Incident Response

    Sponsored by: Barracuda

    When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.

  • Barracuda Lightboard: Total Email Protection

    Sponsored by: Barracuda

    This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.

  • Beyond the Headlines: How is the Pandemic Really Changing Cyberattacks?

    Sponsored by: CI Security

    The spread of the Coronavirus has affected nearly every aspect of our lives, so it should come as no surprise that cyberattackers are taking full advantage. In this webinar, leverage the expertise of an industry expert as they highlight vulnerable areas hackers target most often and offer best practices for mitigating these threats.

  • Cloud Security Guardian Integration with Microsoft Azure 2019

    Sponsored by: Barracuda

    Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.

  • Conquering the Authentication Challenge of Zero Trust

    Sponsored by: Micro Focus

    According to Forrester, passwords, along with similar traditional authentication methods, will soon be a thing of the past to be succeeded by biometrics in the zero-trust authentication architecture. Watch this video to go in-depth into advanced authentication methods, best practices and potential architectural blueprints.

  • Data Security: Best Practices for Remote Workers

    Sponsored by: TITUS

    How do you tackle the issues associated with securing remote workers (such as easily compromised home Wi-Fi networks)? Tune into this webcast to hear experts walk you through best practices for securing your remote workforce and endpoints in today’s distributed enterprises.

  • Doing DevSecOps Right: Implementation & the Metrics that Matter

    Sponsored by: Capsule8

    DevSecOps is a crucial part of an emerging security and IT strategy, one which realizes that security has to be implemented early, often, and in a more flexible manner. But how can your company adopt these practices, and then measure their effectiveness? Watch this Capsule8 video to learn some effective DevSecOps principles and metrics.

  • Email Protection with Asaf Cidon

    Sponsored by: Barracuda

    Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.

  • End-to-End Security Solutions for Mid-Market Businesses

    Sponsored by: Dell Technologies and Intel

    Tune into this webinar to learn directly from industry experts, analysts and product champions on how to transform your business with Dell Technologies’ portfolio of security products and solutions.

  • Equifax and the 147 Million: One Individual’s Story from behind the Headlines

    Sponsored by: Auth0

    What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.

  • Evolution of Email Security

    Sponsored by: Barracuda

    Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.

  • Example of a Cloud Ransomware Attack Video Presented by Spin Technology

    Sponsored by: Spin Tech

    As organizations continue to move their sensitive data to cloud environments, it should come as no surprise that hackers are altering their methods to improve the success rates of their ransomware campaigns. Watch this video to see how a seemingly simple phishing scheme leads to a cloud ransomware attack.

  • From 30% to 100% Remote: How to Lead the Rapid Shift to a Remote Workforce

    Sponsored by: Okta

    Connecting and communicating is critical for maintaining a semblance of normality, especially during times of crisis. Achieving this in the era of COVID-19, which saw the remote workforce jump from 30% to 100%, has been particularly challenging. Watch this webinar to see how IT and workplace technology experts at Okta handled this transition.

  • Guide to Eliminating the Top 3 Security Pain Points

    Sponsored by: Menlo Security

    In this webinar, leverage the knowledge of industry experts at 451 research and Menlo Security to uncover the most significant information security pain points and strategic recommendations for eliminating them.

  • Hot Topic Live Okta Guy Mason

    Sponsored by: Okta

    In this episode of Hot Topics Live, join the CIO of Bourne Leisure, a major player in the UK holiday and hospitality industry, as they discuss how the organization dealt with the pandemic and its ensuing lockdown.

  • How malware authors make attack detection simple yet complex

    Sponsored by: Cisco Umbrella

    Emerging malware techniques indicate that cybercriminals are favoring simple, yet complex tricks in order to successfully conduct their campaigns. Watch this video to learn more about trending threat patterns, new malware tricks and how the simplest techniques can help organizations overcome these challenges.

  • How Okta’s IT + Workplace Teams Are Getting Ready for Dynamic Work

    Sponsored by: Okta

    While the trends and practices within workplace optimization have varied over the last few decades, the main objective has remained the same: Optimize the productivity of people and processes. Watch this webinar and listen to 2 distinguished Okta leaders as they discuss the future of workplace optimization.

  • Automated Compliance: Making the Case and Reaping the Rewards

    Sponsored by: Tripwire, Inc.

    Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.

  • Dirk Hohndel on Intel and the Linux Foundation

    Sponsored by: Intel

    In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.

  • Enterprise Security Checklist

    Sponsored by: Code42

    This 6-item checklist provides key recommendations to help boost security against today's cybercrime.

Browse by Report Type: WS-Security White Papers | WS-Security Multimedia | WS-Security IT Downloads

See more topics related to: WS-Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.