INU Threats Multimedia

(View All Report Types)
Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

IBM Application Security Solutions Demo
sponsored by IBM
SOFTWARE DEMO: IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008

IBM

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

IT Priorities 2018 - What's happening in security?
sponsored by TechTarget ComputerWeekly.com
VIDEO: In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.
Posted: 08 Feb 2021 | Premiered: 02 May 2018

TechTarget ComputerWeekly.com

The Essential Elements of a Modern B2B Architecture
sponsored by IBM
WEBCAST: B2B integration is vital for most companies. Consider these elements when evaluating your B2B architecture strategy.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

Minimize Risk and Strengthen Compliance in Data Exchange
sponsored by IBM
WEBCAST: Are your files secured and reliable? Overcome security and compliance concerns with managed file transfer technology.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

Experience Dynamic Endpoint Threat Defense
sponsored by McAfee, Inc.
VIDEO: Simplify your system and stay ahead of advanced threats with a collaborative framework that shares threat intelligence.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

Consolidate File Transfer Activity
sponsored by IBM
VIDEOCAST: Learn how IBM Sterling File Gateway provides a file transfer solution that's as powerful as it is easy to use.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

Vident Health: More Than the Sum of its Parts
sponsored by McAfee, Inc.
VIDEO: Find out how Vident Health overcame alert overload and enabled an innovative, patient-focused environment.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

Do You Effectively Manage Complex Data Transformation?
sponsored by IBM
VIDEO: Discover how to manage transformation with a single solution as data flows through the enterprise.
Posted: 20 Jan 2017 | Premiered: 20 Jan 2017

TOPICS:  IT Management
IBM