IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed    Add to Google    Add to My Yahoo!
Day Zero Threats Reports
 
Cybersecurity and Overcoming the Intelligence Disconnect
sponsored by BAE Systems
RESEARCH CONTENT: Cybersecurity is now a business risk issue like any other. In this research report, discover how to unite the two different perspectives of the C-Suite and IT decision-makers, especially in regards to what threats they think are greatest, who's accountable for defense, how to use outsourcing, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

BAE Systems

Ransomware: Block Attackers with a Layered Defense
sponsored by Cisco Systems, Inc.
WHITE PAPER: Uncover what ransomware is, what it does, and how customers can defend their organizations against it. Reveal what a layered defense strategy can do for your organization and how to best implement it.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

Cisco Systems, Inc.

Your Guide to Today's Corporate Web Security
sponsored by Forcepoint
WHITE PAPER: Gain insight into the corporate security market with this guide filled with detailed biographies of vendors, analytics of its changing landscape, and a structured way to evaluate any solution.
Posted: 17 Feb 2017 | Published: 31 May 2016

Forcepoint

2017 Annual Cybersecurity Report
sponsored by Cisco Systems, Inc.
RESEARCH CONTENT: Learn how to implement an integrated security architecture by connecting your security tools to work together in an automated, streamlined environment. Discover how to reduce attackers' operational space and uncover the report's key findings about attacker behavior, threat management, vulnerability management, and more.
Posted: 28 Feb 2017 | Published: 31 Jan 2017

Cisco Systems, Inc.

Your Data on the Move: Taking Back Control of Your Most Precious Asset
sponsored by Globalscape
WHITE PAPER: This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Globalscape

Tackling Insider Threats
sponsored by Intel Security
WHITE PAPER: Security is an inside job. Insiders are responsible for more than 40% of data loss. Whether it's intentional or accidental, you need to stop it with policy development, event monitoring, and incident response—backed by a strong set of data loss prevention tools. Learn more. Read Tackling Insider Threats.
Posted: 13 Feb 2017 | Published: 30 Nov 2016

Intel Security

The new EUsecurityrequirements and you
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This infographic reveals how to support compliance while reaping business rewards. Learn about tools that deliver real-time threat intelligence, policy-based data usage assurance, and 2 more compliant ways to use and store data.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Symantec & Blue Coat Systems

A CISO Perspective: Why Unified Security Solutions are a Necessity
sponsored by Forcepoint
WEBCAST: Get a solid look at the market drivers that are favoring the adoption of unified security, as well as the technical and operational blueprints for a successful unified security policy.
Posted: 17 Feb 2017 | Premiered: Feb 17, 2017

Forcepoint

Putting a Next-Generation Firewall Through Its Paces
sponsored by Forcepoint
WHITE PAPER: See how the Forcepoint Stonesoft Next-Generation Firewall was given a detailed product scorecard after being subjected to thorough testing for security effectiveness (exploits, false positives, etc.), performance (UDP throughput, max capacity, etc.), stability and reliability ant total cost of ownership.
Posted: 20 Feb 2017 | Published: 31 Dec 2015

Forcepoint

7 Essential Components of a Threat Intelligence Program
sponsored by Recorded Future
WHITE PAPER: Explore how to produce a world-class threat intelligence capability in this white paper. Uncover 7 important aspects of a threat intelligence program, including relationship building, trend identification, and 5 more.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

Recorded Future
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement