Whitepaper | Security
McAfee

This report covers the survey results of 1,400 IT decision makers who use public and private cloud services, representing a broad range of industries and 11 countries. The results explore cloud usage...

Read MorePublished: 19/03/2019
Whitepaper | Security
Ixia

The time it takes for most IT departments to notice and remediate a network intrusion usually takes about 65 days, according to the 2017 Trustwave Global Security Report. This gives hackers plenty of...

Read MorePublished: 19/03/2019
Event | Security
Palo Alto Networks

Palo Alto Networks APAC Tech Summit 2019 | Thailand

2 - 4 Apr 2019 - Bangkok, Thailand

Join Palo Alto Networks to:

Learn all the latest security best practices from our product and engineering experts.
Find out about our latest products and capabilities.
Take the...

Read MorePublished: 19/03/2019
Conference | Security
Media Corp International

CISO Leaders Summit Singapore 2019

26 Nov 2019 - Singapore

Media Corp International's CISO Leaders Summit will bring together over 100 of the countries most senior Security IT leaders to gather for a strategic event in order to exchange knowledge and...

Read MorePublished: 15/03/2019
Conference | Security
Media Corp International

CISO Leaders Summit Sydney 2019

24 Oct 2019 - Sydney, Australia

Media Corp International's CISO Leaders Summit will bring together over 100 of the countries most senior Security IT leaders to gather for a strategic event in order to exchange knowledge and...

Read MorePublished: 15/03/2019
Conference | Security
Media Corp International

CISO Leaders Summit Melbourne 2019

2 May 2019 - Melbourne, Australia

Media Corp International's CISO Leaders Summit will bring together over 100 of the countries most senior Security IT leaders to gather for a strategic event in order to exchange knowledge and...

Read MorePublished: 15/03/2019
Webinar | Security
RSA

Building on the popularity of the highly technical Operationalizing Incident Response workshop, RSA is offering a special virtual version of this in-person event. During the webinar, Shane Harsh will...

Read MorePublished: 15/03/2019
New Product | Security
RSA

The RSA NetWitness Platform for threat defense applies the most advanced technology to detect, prioritize and automate the response to threats in a fraction of the time of other platforms.

Read MorePublished: 15/03/2019
New Product | Security
RSA

Organizations of all sizes are struggling to manage the magnitude, velocity and complexity of today’s existing and emerging risks. The very strategies they’re pursuing to fuel growth and innovation,...

Read MorePublished: 15/03/2019
Press Release | Security
Mimecast

Mimecast Limited, a leading email and data security company, today announced the Mimecast Threat Center, a group of hands-on, cybersecurity experts focused on providing threat intelligence that helps...

Read MorePublished: 15/03/2019
Press Release | Security
Mimecast

Mimecast Limited, a leading email and data security company, today announced the latest Email Security Risk Assessment (ESRA) report, an aggregated analysis of tests that measure the efficacy of...

Read MorePublished: 15/03/2019
Whitepaper | Security
Imperva

In this Ovum whitepaper, we discuss why your enterprise needs to update its database security, and what are the two broad kinds of data security tools: 1) database security tools such as data activity...

Read MorePublished: 15/03/2019
Whitepaper | Security
Radware

The Web application security landscape is in a state of flux. DevOps, cloud migration and more is forcing security teams to investigate new way to keep up with new vulnerabilities and to manage...

Read MorePublished: 14/03/2019
Whitepaper | Security
Radware

This white paper explores the security threat that excessive permissions in public cloud environments pose and how to properly mitigate them.

Read MorePublished: 14/03/2019
Whitepaper | Security
Forcepoint

The cloud era has created a new challenge for agency cybersecurity teams: agencies need unified data protection on-premises and in the cloud, and they must stop bad actors from accessing cloud...

Read MorePublished: 14/03/2019
Whitepaper | Security
Forcepoint

The Cloud Access Security Broker (CASB) is an emerging security technology that specifically addresses the data protection challenges and other associated threats that come with the...

Read MorePublished: 14/03/2019
Whitepaper | Security
Forcepoint

With nearly 100 sites, the Department of Energy can achieve significant value in increasing use of cloud computing. But in doing so, it must also acquire unified data protection on-premises and in the...

Read MorePublished: 14/03/2019
Event | Security
Trend Micro

There have been many claims made around Endpoint Detection and Response (EDR) as an effective tool in combatting advanced threats that evade signature-based AV defences.

Join Trend Micro's EDR...

Read MorePublished: 13/03/2019
Event | Security
Trend Micro

There have been many claims made around Endpoint Detection and Response (EDR) as an effective tool in combatting advanced threats that evade signature-based AV defences.

Join Trend Micro's EDR...

Read MorePublished: 13/03/2019
Webinar | Security
Trend Micro

High-impact vulnerabilities like Heartbleed, Shellshock, and EternalBlue and zero-day exploits are striking with more frequency, making vulnerability management a critical security control that...

Read MorePublished: 13/03/2019
Show More..
Top
ITUpdate loading
Loading...