Search Results for: Black Ice Defender firewall

Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020
In this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.

TechTarget ComputerWeekly.com

Botnet attacks are evolving; your defenses must too
Botnet attacks will expand and evolve. The best way to fight back is to stop searching for the perfect botnet-protection tool and layer defenses instead.

AppGuard

The Economics of Defense: Modeling Security Investments
There are a number of factors to take into account when building, or modifying, your cybersecurity strategy – and inside this report, take a look at 5 drivers that influence the costs of cybersecurity.

Juniper Networks, Inc.

Your September Issue of Information Security Magazine– Readers’ Choice Awards
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.

Information Security Magazine

The Essential Guide to the 2023 MITRE Engenuity ATT&CK Evaluations
In this e-book, take a comparative look at how endpoint security solutions performed in the most recent ATT&CK evaluation, and find out how Palo Alto Networks are stepping up to the challenge.

TOPICS: .NET
Palo Alto Networks

Information Security Asean July 2016
In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.

TechTarget Security

Information Security ANZ July 2016
Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.

TechTarget Security

The Essential Guide to the 2023 MITRE Engenuity ATT&CK Evaluations
Discover how Palo Alto Networks' Cortex XDR performed in MITRE's 2023 cyberattack simulations versus Turla. Achieving 100% visibility, it blocked all techniques, ensuring top-quality detections. Delve into the results and uncover Cortex XDR's effectiveness in this report.

TOPICS: .NET
Palo Alto Networks

Presentation Transcript: Malware Reloaded - Mitigating the Next Evolution of Cyber Attacks
View this presentation transcript to explore the evolution of the threat landscape, new behaviours that have been identified, a quantitative analysis of threat intelligence, and inferences, conclusions, and the road ahead.

Dell SecureWorks

The CISO's guide to supply chain security
Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

TechTarget ComputerWeekly.com