Government Security Multimedia

(View All Report Types)
Chancellor Rishi Sunak listens to UK tech – Computer Weekly Downtime Upload podcast
sponsored by TechTarget ComputerWeekly.com
PODCAST: In this episode of the Computer Weekly Downtime Upload podcast, CW editor in chief Bryan Glick joins Caroline Donnelly, Clare McDonald and Brian McKenna to discuss his fireside chat with Chancellor of the Exchequer Rishi Sunak at a high-level Treasury tech sector conference.
Posted: 23 Sep 2021 | Premiered: Sep 23, 2021

TechTarget ComputerWeekly.com

The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009

Lumension

Your guide to container security: Tips and tricks for success
sponsored by Palo Alto Networks
WEBCAST: To ensure you fully understand the container attack surface and to ward off container security risks, tune into the following webcast. Inside, you’ll takeaway 4 containers and Kubernetes security best practices to immediately apply in your organization.
Posted: 01 May 2024 | Premiered: May 1, 2024

Palo Alto Networks

Digital Workforce in Air Travel Smooths Customer Journey
sponsored by Hewlett-Packard Enterprise
VIDEO: Hear how digital changes and integrated technologies improve employee productivity and the overall airport experience.
Posted: 08 Feb 2017 | Premiered: 08 Feb 2017

TOPICS:  IT Management
Hewlett-Packard Enterprise

A Perspective on U.S. Health Industry Changes
sponsored by IBM
VIDEO: Director of Health Industry Transformation at IBM gives his perspective on the changes impacting U.S. Healthcare.
Posted: 20 Jan 2017 | Premiered: 20 Jan 2017

TOPICS:  IT Management
IBM

Reduce Insider Threats Risk Through End User Empowerment
sponsored by McAfee, Inc.
VIDEO: Employees are a giant risk to your most sensitive data. Reduce the risk by educating users on the three best practices.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

Visual Digital Platforms: Crucial Technology to Eliminate Poverty
sponsored by Hewlett-Packard Enterprise
VIDEO: See how Foundation Paraguay helps thousands of families overcome poverty with digital services and a bottom-up approach.
Posted: 30 Jan 2017 | Premiered: 30 Jan 2017

TOPICS:  IT Management
Hewlett-Packard Enterprise

Securing the Enterprise in a DevOps World: Keynote & Panel
sponsored by Veracode, Inc.
WEBCAST: Watch this roundtable discussion about the pitfalls and successes of the DevOps initiative organizations run into and much more.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

TOPICS:  IT Management
Veracode, Inc.

Stop Living in the Past: A New Approach to Application Security
sponsored by Veracode, Inc.
WEBCAST: This webcast will discuss how organizations should evolve their security strategies as users and apps become the risk focal point. Watch to learn how.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

TOPICS:  IT Management
Veracode, Inc.

Best Practices for Securing SaaS with CASB
sponsored by McAfee, Inc.
VIDEO: Listen to Securosis and McAfee discuss the challenges in cloud security and the benefits of agile security solutions.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.