PODCAST:
In this week's episode of the Computer Weekly Downtime Upload podcast, Caroline Donnelly, Clare McDonald and Brian McKenna talk about the Travelex ransomware attack, the retail sector's poor performance in 2019, and Harry and Meghan's Instagram-powered separation from the Windsors.
VIDEO:
Over half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.
WEBCAST:
Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
WEBCAST:
This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
WEBCAST:
This webinar goes through the best practices for SaaS data protection. Presented by industry experts, it touches on the key points for understanding how to ensure SaaS data protection and how to find the right provider.
WEBCAST:
Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.
PODCAST:
In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more.
VIDEO:
During the webcast, Dr. Wang of Forrester Research and Ashar Aziz of FireEye will provide insight on data breach incidents and how to protect your company from cybercrime.
WEBCAST:
This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
WEBCAST:
Join us to examine some of the malware risks associated with heterogeneous computing environments and solutions to protect your valuable business assets.