Posted Date:28/06/2017

    Druva Annual Ransomware Report: 2017 Survey

    With an estimated 4,000 ransomware attacks occurring each day, it has now become a material threat to corporate data. With this recent Druva survey of over 800 IT professionals, learn how...


    How to Prepare Your Defenses Against the New Generation of DDoS

    12 Jul 2017 - 2:00PM HKT

    Join Radware for a webinar to learn a rapidly evolving threat landscape: key trends in DDoS attack, the new generation of attacks: IoT botnets open the 1Tbps floodgates and many more.


    Technical Deep Dive on Enterprise Mobility & Security

    11 - 13 Jul 2017 - 10:30AM IST

    A broad range of topics will be covered during this 3 day webcast series, including mobile devices, app and data management with Intune, hybrid identity and access management with Azure Active...

    Posted Date:27/06/2017

    The 2017 State of Cybersecurity

    In the 2017 State of Cybersecurity report, thought leaders at Forcepoint assert that the security industry is in need of a paradigm shift toward examining user behavior and intent. The report...


    Virtual Ultimate Test Drive MP

    20 Jul 2017 - 1PM SGT

    In this free, two-hour virtual workshop, you will learn Migrating to a Palo Alto Networks next-generation firewall is a critical step toward the prevention and detection of cyberattacks.


    Power of The Proxy

    06 Jul 2017 - 1PM HKT; SGT; MYT

    The traditional security perimeter that your IT team used to be able to define surrounding cloud security is now dissolving. So if you are adopting more cloud services, putting more employees in...


    The Roadmap of Risk Culture

    18 Jul 2017 - 10AM AEST

    RSA would like to invite you to attend a webinar on "The Roadmap of Risk Culture" on Thursday 22 June 2017 at 10 am. The webinar will discuss some of the important points in building a risk culture as...

    New Product|Security

    Palo Alto Networks Application Framework

    With the Palo Alto Networks Application Framework, we are ushering in the future of security innovation, reinventing how customers rapidly access, evaluate and adopt the most compelling new security...


    FSI Day: Build A Cyber-Resilient Organisation

    13 Jul 2017 - Jakarta, Indonesia

    Cyber-resilient organizations are able to limit damage and recover quickly in the event of successful attacks, a key capability to successfully managing cyber risk. This session will give you the...

    Posted Date:20/06/2017

    15 Steps to Reducing Security Risks in Business Mobility

    The key steps you need to take in order to minimize the potential for security breaches and loss of data associated with mobile devices.

    Posted Date:20/06/2017

    Proofpoint - The Human Factor 2017

    To explore this under-reported aspect of enterprise threats, Proofpoint created The Human Factor Report.

    Press Release|Security

    Centrify Enables Organizations to Stop Breaches That Start on Mac...

    05 Jun 2017

    New capabilities reduce risk by securing local administrator passwords and simplifying Mac application management with turnkey Munki integration.

    Press Release|Security

    Security professionals point to bored and distracted employees as...

    08 Jun 2017

    Over half say they would trust technology over humans as a way of avoiding mistakes.

    Press Release|Security

    Centrify Enables Government Agencies to Embrace Hybrid Infrastructure,...

    13 Jun 2017

    Centrify’s solution is in the final stage of achieving compliance with the Federal Risk and Authorization Management Program (FedRAMP).

    Press Release|Security

    Hacked in Translation: Check Point Shows How Hackers Can Use Subtitles...

    20 May 2017

    Check Point researchers discovered a new attack vector that could allow hackers to create malicious subtitles to target users of popular media platforms to gain complete control of users’ PCs,...

    Posted Date:20/06/2017

    The Top Five Ways to Relieve the Pain of Managing Hybrid AD...

    Get your own copy to read about how One Identity Active Roles can help you manage your entire hybrid environment with one solution, avoid common implementation mistakes, ensure your AD/AAD data is...


    Ultimate Test Drive - Adelaide

    06 Sept 2017 - Adelaide, Australia

    In this free half-day technical workshop you will learn how to defeat the adversary at the endpoint.

    Posted Date:16/06/2017

    How Zscaler™ Can Disrupt the Cyber Kill Chain

    An Infrastructure Security Review by the Zscaler Solution Architect team.

    Posted Date:16/06/2017

    Technical Knowledge Series: Ransomware

    Cloud sandboxing protection is as essential to security as keys are to encryption. Preventing CIOs and CISOs from having to make excuses when it comes to APTs, zero-days, and ransomware.

    Posted Date:16/06/2017

    Invisible Mobile Banking Channel Security

    How RASP and Behavioral Biometrics Help You to Make the Best Mobile App Security Decisions.

    Your search did not match any content.
    Show More..
    ITUpdate loading

    Not yet a member?

    Sign-up! It's Free!!
    × Not a member yet?
    Sign-up Now!
    It's Free!
    × Close